{"id":"USN-2372-1","summary":"firefox vulnerabilities","details":"Bobby Holley, Christian Holler, David Bolter, Byron Campen, Jon Coppeard,\nCarsten Book, Martijn Wargers, Shih-Chiang Chien, Terrence Cole and\nJeff Walden discovered multiple memory safety issues in Firefox. If a user\nwere tricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service via application\ncrash, or execute arbitrary code with the privileges of the user invoking\nFirefox. (CVE-2014-1574, CVE-2014-1575)\n\nAtte Kettunen discovered a buffer overflow during CSS manipulation. If a\nuser were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to cause a denial of service via\napplication crash or execute arbitrary code with the privileges of the\nuser invoking Firefox. (CVE-2014-1576)\n\nHolger Fuhrmannek discovered an out-of-bounds read with Web Audio. If a\nuser were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to steal sensitive information.\n(CVE-2014-1577)\n\nAbhishek Arya discovered an out-of-bounds write when buffering WebM video\nin some circumstances. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this to cause a\ndenial of service via application crash or execute arbitrary code with\nthe privileges of the user invoking Firefox. (CVE-2014-1578)\n\nMichal Zalewski discovered that memory may not be correctly initialized\nwhen rendering a malformed GIF in to a canvas in some circumstances. If\na user were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to steal sensitive information.\n(CVE-2014-1580)\n\nA use-after-free was discovered during text layout in some circumstances.\nIf a user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service via\napplication crash or execute arbitrary code with the privileges of the\nuser invoking Firefox. (CVE-2014-1581)\n\nPatrick McManus and David Keeler discovered 2 issues that could result\nin certificate pinning being bypassed in some circumstances. An attacker\nwith a fraudulent certificate could potentially exploit this conduct a\nmachine-in-the-middle attack. (CVE-2014-1582, CVE-2014-1584)\n\nEric Shepherd and Jan-Ivar Bruaroey discovered issues with video sharing\nvia WebRTC in iframes, where video continues to be shared after being\nstopped and navigating to a new site doesn't turn off the camera. An\nattacker could potentially exploit this to access the camera without the\nuser being aware. (CVE-2014-1585, CVE-2014-1586)\n\nBoris Zbarsky discovered that webapps could use the Alarm API to read the\nvalues of cross-origin references. If a user were tricked in to installing\na specially crafter webapp, an attacker could potentially exploit this to\nbypass same-origin restrictions. (CVE-2014-1583)\n","modified":"2026-04-22T09:02:43.765690Z","published":"2014-10-14T17:22:49Z","related":["UBUNTU-CVE-2014-1574","UBUNTU-CVE-2014-1575","UBUNTU-CVE-2014-1576","UBUNTU-CVE-2014-1577","UBUNTU-CVE-2014-1578","UBUNTU-CVE-2014-1580","UBUNTU-CVE-2014-1581","UBUNTU-CVE-2014-1582","UBUNTU-CVE-2014-1583","UBUNTU-CVE-2014-1584","UBUNTU-CVE-2014-1585","UBUNTU-CVE-2014-1586"],"upstream":["CVE-2014-1574","CVE-2014-1575","CVE-2014-1576","CVE-2014-1577","CVE-2014-1578","CVE-2014-1580","CVE-2014-1581","CVE-2014-1582","CVE-2014-1583","CVE-2014-1584","CVE-2014-1585","CVE-2014-1586","UBUNTU-CVE-2014-1574","UBUNTU-CVE-2014-1575","UBUNTU-CVE-2014-1576","UBUNTU-CVE-2014-1577","UBUNTU-CVE-2014-1578","UBUNTU-CVE-2014-1580","UBUNTU-CVE-2014-1581","UBUNTU-CVE-2014-1582","UBUNTU-CVE-2014-1583","UBUNTU-CVE-2014-1584","UBUNTU-CVE-2014-1585","UBUNTU-CVE-2014-1586"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2372-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1574"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1575"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1576"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1577"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1578"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1580"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1581"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1582"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1583"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1584"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1585"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1586"}],"affected":[{"package":{"name":"firefox","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/firefox@33.0+build2-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"33.0+build2-0ubuntu0.14.04.1"}]}],"versions":["24.0+build1-0ubuntu1","25.0+build3-0ubuntu0.13.10.1","28.0~b2+build1-0ubuntu2","28.0+build1-0ubuntu1","28.0+build2-0ubuntu1","28.0+build2-0ubuntu2","29.0+build1-0ubuntu0.14.04.2","30.0+build1-0ubuntu0.14.04.3","31.0+build1-0ubuntu0.14.04.1","32.0+build1-0ubuntu0.14.04.1","32.0.3+build1-0ubuntu0.14.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"firefox","binary_version":"33.0+build2-0ubuntu0.14.04.1"},{"binary_name":"firefox-globalmenu","binary_version":"33.0+build2-0ubuntu0.14.04.1"},{"binary_name":"firefox-mozsymbols","binary_version":"33.0+build2-0ubuntu0.14.04.1"},{"binary_name":"firefox-testsuite","binary_version":"33.0+build2-0ubuntu0.14.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2372-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-1574"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-1575"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-1576"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-1577"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-1578"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-1580"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-1581"},{"severity":[{"type":"Ubuntu","score":"low"}],"id":"CVE-2014-1582"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-1583"},{"severity":[{"type":"Ubuntu","score":"low"}],"id":"CVE-2014-1584"},{"severity":[{"type":"Ubuntu","score":"low"}],"id":"CVE-2014-1585"},{"severity":[{"type":"Ubuntu","score":"low"}],"id":"CVE-2014-1586"}]}}}],"schema_version":"1.7.5"}