Critical severity9.8NVD Advisory· Published Mar 19, 2014· Updated May 6, 2026
CVE-2014-1514
CVE-2014-1514
Description
vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- bugzilla.mozilla.org/show_bug.cginvdExploitIssue TrackingVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-0310.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-0316.htmlnvdThird Party Advisory
- www.debian.org/security/2014/dsa-2881nvdThird Party Advisory
- www.debian.org/security/2014/dsa-2911nvdThird Party Advisory
- www.mozilla.org/security/announce/2014/mfsa2014-32.htmlnvdVendor Advisory
- www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/66240nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2151-1nvdThird Party Advisory
- security.gentoo.org/glsa/201504-01nvdThird Party Advisory
News mentions
0No linked articles in our index yet.