UBUNTU-CVE-2014-1592

Source
https://ubuntu.com/security/CVE-2014-1592
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-1592.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2014-1592
Upstream
  • CVE-2014-1592
Downstream
Related
Published
2014-12-02T00:00:00Z
Modified
2026-02-04T04:38:45.332796Z
Severity
  • Ubuntu - medium
Summary
[none]
Details

Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.

References

Affected packages

Ubuntu:14.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@34.0+build2-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
34.0+build2-0ubuntu0.14.04.1

Affected versions

24.*
24.0+build1-0ubuntu1
25.*
25.0+build3-0ubuntu0.13.10.1
28.*
28.0~b2+build1-0ubuntu2
28.0+build1-0ubuntu1
28.0+build2-0ubuntu1
28.0+build2-0ubuntu2
29.*
29.0+build1-0ubuntu0.14.04.2
30.*
30.0+build1-0ubuntu0.14.04.3
31.*
31.0+build1-0ubuntu0.14.04.1
32.*
32.0+build1-0ubuntu0.14.04.1
32.0.3+build1-0ubuntu0.14.04.1
33.*
33.0+build2-0ubuntu0.14.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "34.0+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox"
        },
        {
            "binary_version": "34.0+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox-dev"
        },
        {
            "binary_version": "34.0+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox-globalmenu"
        },
        {
            "binary_version": "34.0+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox-mozsymbols"
        },
        {
            "binary_version": "34.0+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox-testsuite"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-1592.json"

Ubuntu:14.04:LTS / thunderbird

Package

Name
thunderbird
Purl
pkg:deb/ubuntu/thunderbird@1:31.3.0+build1-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:31.3.0+build1-0ubuntu0.14.04.1

Affected versions

1:24.*
1:24.0+build1-0ubuntu1
1:24.0+build1-0ubuntu2
1:24.1.1+build1-0ubuntu0.13.10.1
1:24.1.1+build1-0ubuntu1
1:24.2.0+build1-0ubuntu1
1:24.4.0+build1-0ubuntu1
1:24.5.0+build1-0ubuntu0.14.04.1
1:24.6.0+build1-0ubuntu0.14.04.1
1:31.*
1:31.0+build1-0ubuntu0.14.04.1
1:31.1.1+build1-0ubuntu0.14.04.1
1:31.1.2+build1-0ubuntu0.14.04.1
1:31.2.0+build2-0ubuntu0.14.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:31.3.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird"
        },
        {
            "binary_version": "1:31.3.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-dev"
        },
        {
            "binary_version": "1:31.3.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-globalmenu"
        },
        {
            "binary_version": "1:31.3.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-gnome-support"
        },
        {
            "binary_version": "1:31.3.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-mozsymbols"
        },
        {
            "binary_version": "1:31.3.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-testsuite"
        },
        {
            "binary_version": "1:31.3.0+build1-0ubuntu0.14.04.1",
            "binary_name": "xul-ext-calendar-timezones"
        },
        {
            "binary_version": "1:31.3.0+build1-0ubuntu0.14.04.1",
            "binary_name": "xul-ext-gdata-provider"
        },
        {
            "binary_version": "1:31.3.0+build1-0ubuntu0.14.04.1",
            "binary_name": "xul-ext-lightning"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-1592.json"