High severity8.8NVD Advisory· Published Mar 19, 2014· Updated May 6, 2026
CVE-2014-1513
CVE-2014-1513
Description
TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- bugzilla.mozilla.org/show_bug.cginvdExploitIssue TrackingVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-0310.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-0316.htmlnvdThird Party Advisory
- www.debian.org/security/2014/dsa-2881nvdThird Party Advisory
- www.debian.org/security/2014/dsa-2911nvdThird Party Advisory
- www.mozilla.org/security/announce/2014/mfsa2014-31.htmlnvdVendor Advisory
- www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/66203nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2151-1nvdThird Party Advisory
- security.gentoo.org/glsa/201504-01nvdThird Party Advisory
News mentions
0No linked articles in our index yet.