Name | CVE-2014-1508 |
Description | The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-2881-1, DSA-2911-1 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
icedove | source | squeeze | (unfixed) | end-of-life | ||
icedove | source | wheezy | 24.4.0-1~deb7u1 | DSA-2911-1 | ||
icedove | source | (unstable) | 24.4.0-1 | |||
iceweasel | source | squeeze | (unfixed) | end-of-life | ||
iceweasel | source | wheezy | 24.4.0esr-1~deb7u2 | DSA-2881-1 | ||
iceweasel | source | (unstable) | 24.4.0esr-1 |