CVE-2014-1479
Published: 4 February 2014
The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.
Priority
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
upstream |
Released
(27.0)
|
lucid |
Ignored
(end of life)
|
|
precise |
Released
(27.0+build1-0ubuntu0.12.04.1)
|
|
quantal |
Released
(27.0+build1-0ubuntu0.12.10.1)
|
|
saucy |
Released
(27.0+build1-0ubuntu0.13.10.1)
|
|
thunderbird Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(1:24.3.0+build2-0ubuntu0.12.04.1)
|
|
quantal |
Released
(1:24.3.0+build2-0ubuntu0.12.10.1)
|
|
saucy |
Released
(1:24.3.0+build2-0ubuntu0.13.10.1)
|
|
upstream |
Released
(24.3.0)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |