UBUNTU-CVE-2015-0813

Source
https://ubuntu.com/security/CVE-2015-0813
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-0813.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2015-0813
Upstream
  • CVE-2015-0813
Downstream
Related
Published
2015-04-01T00:00:00Z
Modified
2026-04-22T09:22:23.551787Z
Severity
  • Ubuntu - medium
Summary
[none]
Details

Use-after-free vulnerability in the AppendElements function in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 on Linux, when the Fluendo MP3 plugin for GStreamer is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted MP3 file.

References

Affected packages

Ubuntu:14.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@37.0+build2-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
37.0+build2-0ubuntu0.14.04.1

Affected versions

24.*
24.0+build1-0ubuntu1
25.*
25.0+build3-0ubuntu0.13.10.1
28.*
28.0~b2+build1-0ubuntu2
28.0+build1-0ubuntu1
28.0+build2-0ubuntu1
28.0+build2-0ubuntu2
29.*
29.0+build1-0ubuntu0.14.04.2
30.*
30.0+build1-0ubuntu0.14.04.3
31.*
31.0+build1-0ubuntu0.14.04.1
32.*
32.0+build1-0ubuntu0.14.04.1
32.0.3+build1-0ubuntu0.14.04.1
33.*
33.0+build2-0ubuntu0.14.04.1
34.*
34.0+build2-0ubuntu0.14.04.1
35.*
35.0+build3-0ubuntu0.14.04.2
35.0.1+build1-0ubuntu0.14.04.1
36.*
36.0+build2-0ubuntu0.14.04.4
36.0.1+build2-0ubuntu0.14.04.1
36.0.4+build1-0ubuntu0.14.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "37.0+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox"
        },
        {
            "binary_version": "37.0+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox-globalmenu"
        },
        {
            "binary_version": "37.0+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox-mozsymbols"
        },
        {
            "binary_version": "37.0+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox-testsuite"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-0813.json"

Ubuntu:14.04:LTS / thunderbird

Package

Name
thunderbird
Purl
pkg:deb/ubuntu/thunderbird@1:31.6.0+build1-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:31.6.0+build1-0ubuntu0.14.04.1

Affected versions

1:24.*
1:24.0+build1-0ubuntu1
1:24.0+build1-0ubuntu2
1:24.1.1+build1-0ubuntu0.13.10.1
1:24.1.1+build1-0ubuntu1
1:24.2.0+build1-0ubuntu1
1:24.4.0+build1-0ubuntu1
1:24.5.0+build1-0ubuntu0.14.04.1
1:24.6.0+build1-0ubuntu0.14.04.1
1:31.*
1:31.0+build1-0ubuntu0.14.04.1
1:31.1.1+build1-0ubuntu0.14.04.1
1:31.1.2+build1-0ubuntu0.14.04.1
1:31.2.0+build2-0ubuntu0.14.04.1
1:31.3.0+build1-0ubuntu0.14.04.1
1:31.4.0+build1-0ubuntu0.14.04.1
1:31.5.0+build1-0ubuntu0.14.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:31.6.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird"
        },
        {
            "binary_version": "1:31.6.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-globalmenu"
        },
        {
            "binary_version": "1:31.6.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-gnome-support"
        },
        {
            "binary_version": "1:31.6.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-mozsymbols"
        },
        {
            "binary_version": "1:31.6.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-testsuite"
        },
        {
            "binary_version": "1:31.6.0+build1-0ubuntu0.14.04.1",
            "binary_name": "xul-ext-calendar-timezones"
        },
        {
            "binary_version": "1:31.6.0+build1-0ubuntu0.14.04.1",
            "binary_name": "xul-ext-gdata-provider"
        },
        {
            "binary_version": "1:31.6.0+build1-0ubuntu0.14.04.1",
            "binary_name": "xul-ext-lightning"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-0813.json"