{"id":"USN-2295-1","summary":"firefox vulnerabilities","details":"Christian Holler, David Keeler, Byron Campen, Gary Kwong, Jesse Ruderman,\nAndrew McCreight, Alon Zakai, Bobby Holley, Jonathan Watt, Shu-yu Guo,\nSteve Fink, Terrence Cole, Gijs Kruitbosch and Cătălin Badea discovered\nmultiple memory safety issues in Firefox. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthese to cause a denial of service via application crash, or execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2014-1547, CVE-2014-1548)\n\nAtte Kettunen discovered a buffer overflow when interacting with WebAudio\nbuffers. An attacker could potentially exploit this to cause a denial of\nservice via application crash or execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2014-1549)\n\nAtte Kettunen discovered a use-after-free in WebAudio. An attacker could\npotentially exploit this to cause a denial of service via application\ncrash or execute arbitrary code with the privileges of the user invoking\nFirefox. (CVE-2014-1550)\n\nDavid Chan and Gijs Kruitbosch discovered that web content could spoof\nUI customization events in some circumstances, resulting in a limited\nability to move UI icons. (CVE-2014-1561)\n\nJethro Beekman discovered a use-after-free when the FireOnStateChange\nevent is triggered in some circumstances. An attacker could potentially\nexploit this to cause a denial of service via application crash or\nexecute arbitrary code with the priviliges of the user invoking Firefox.\n(CVE-2014-1555)\n\nPatrick Cozzi discovered a crash when using the Cesium JS library to\ngenerate WebGL content. An attacker could potentially exploit this to\nexecute arbitrary code with the privilges of the user invoking Firefox.\n(CVE-2014-1556)\n\nTyson Smith and Jesse Schwartzentruber discovered a use-after-free in\nCERT_DestroyCertificate. An attacker could potentially exploit this to\ncause a denial of service via application crash or execute arbitrary\ncode with the privileges of the user invoking Firefox. (CVE-2014-1544)\n\nA crash was discovered in Skia when scaling an image, if the scaling\noperation takes too long. An attacker could potentially exploit this to\nexecute arbitrary code with the privileges of the user invoking Firefox.\n(CVE-2014-1557)\n\nChristian Holler discovered several issues when parsing certificates\nwith non-standard character encoding, resulting in the inability to\nuse valid SSL certificates in some circumstances. (CVE-2014-1558,\nCVE-2014-1559, CVE-2014-1560)\n\nBoris Zbarsky discovered that network redirects could cause an iframe\nto escape the confinements defined by its sandbox attribute in\nsome circumstances. An attacker could potentially exploit this to\nconduct cross-site scripting attacks. (CVE-2014-1552)\n","modified":"2026-02-10T04:40:49Z","published":"2014-07-22T20:38:51Z","related":["UBUNTU-CVE-2014-1544","UBUNTU-CVE-2014-1547","UBUNTU-CVE-2014-1548","UBUNTU-CVE-2014-1549","UBUNTU-CVE-2014-1550","UBUNTU-CVE-2014-1552","UBUNTU-CVE-2014-1555","UBUNTU-CVE-2014-1556","UBUNTU-CVE-2014-1557","UBUNTU-CVE-2014-1558","UBUNTU-CVE-2014-1559","UBUNTU-CVE-2014-1560","UBUNTU-CVE-2014-1561"],"upstream":["CVE-2014-1544","CVE-2014-1547","CVE-2014-1548","CVE-2014-1549","CVE-2014-1550","CVE-2014-1552","CVE-2014-1555","CVE-2014-1556","CVE-2014-1557","CVE-2014-1558","CVE-2014-1559","CVE-2014-1560","CVE-2014-1561","UBUNTU-CVE-2014-1544","UBUNTU-CVE-2014-1547","UBUNTU-CVE-2014-1548","UBUNTU-CVE-2014-1549","UBUNTU-CVE-2014-1550","UBUNTU-CVE-2014-1552","UBUNTU-CVE-2014-1555","UBUNTU-CVE-2014-1556","UBUNTU-CVE-2014-1557","UBUNTU-CVE-2014-1558","UBUNTU-CVE-2014-1559","UBUNTU-CVE-2014-1560","UBUNTU-CVE-2014-1561"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2295-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1544"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1547"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1548"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1549"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1550"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1552"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1555"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1556"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1557"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1558"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1559"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1560"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1561"},{"type":"REPORT","url":"https://launchpad.net/bugs/1342311"}],"affected":[{"package":{"name":"firefox","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/firefox@31.0+build1-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"31.0+build1-0ubuntu0.14.04.1"}]}],"versions":["24.0+build1-0ubuntu1","25.0+build3-0ubuntu0.13.10.1","28.0~b2+build1-0ubuntu2","28.0+build1-0ubuntu1","28.0+build2-0ubuntu1","28.0+build2-0ubuntu2","29.0+build1-0ubuntu0.14.04.2","30.0+build1-0ubuntu0.14.04.3"],"ecosystem_specific":{"binaries":[{"binary_version":"31.0+build1-0ubuntu0.14.04.1","binary_name":"firefox"},{"binary_version":"31.0+build1-0ubuntu0.14.04.1","binary_name":"firefox-dev"},{"binary_version":"31.0+build1-0ubuntu0.14.04.1","binary_name":"firefox-globalmenu"},{"binary_version":"31.0+build1-0ubuntu0.14.04.1","binary_name":"firefox-mozsymbols"},{"binary_version":"31.0+build1-0ubuntu0.14.04.1","binary_name":"firefox-testsuite"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2295-1.json","cves_map":{"cves":[{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1544"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1547"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1548"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1549"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1550"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1552"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1555"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1556"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1557"},{"severity":[{"score":"low","type":"Ubuntu"}],"id":"CVE-2014-1558"},{"severity":[{"score":"low","type":"Ubuntu"}],"id":"CVE-2014-1559"},{"severity":[{"score":"low","type":"Ubuntu"}],"id":"CVE-2014-1560"},{"severity":[{"score":"low","type":"Ubuntu"}],"id":"CVE-2014-1561"}],"ecosystem":"Ubuntu:14.04:LTS"}}}],"schema_version":"1.7.3"}