Unrated severityNVD Advisory· Published Jul 23, 2014· Updated May 6, 2026
CVE-2014-1544
CVE-2014-1544
Description
Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.
Affected products
71cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*range: <=30.0
- cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*+ 50 more
- cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*+ 8 more
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*range: <=24.6
- cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
16- www.mozilla.org/security/announce/2014/mfsa2014-63.htmlnvdVendor Advisory
- secunia.com/advisories/59591nvd
- secunia.com/advisories/59719nvd
- secunia.com/advisories/59760nvd
- secunia.com/advisories/60083nvd
- secunia.com/advisories/60486nvd
- secunia.com/advisories/60621nvd
- secunia.com/advisories/60628nvd
- www.debian.org/security/2014/dsa-2986nvd
- www.debian.org/security/2014/dsa-2996nvd
- www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlnvd
- www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlnvd
- www.securityfocus.com/bid/68816nvd
- www.securitytracker.com/id/1030617nvd
- bugzilla.mozilla.org/show_bug.cginvd
- security.gentoo.org/glsa/201504-01nvd
News mentions
0No linked articles in our index yet.