The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted audio content that is improperly handled during playback buffering.
CPE | Name | Operator | Version |
---|---|---|---|
firefox | le | 30.0 | |
thunderbird | le | 24.7 | |
thunderbird | eq | 24.0.1 | |
thunderbird | eq | 24.2 | |
thunderbird | eq | 24.5 | |
thunderbird | eq | 24.1 | |
thunderbird | eq | 24.1.1 | |
thunderbird | eq | 24.4 | |
thunderbird | eq | 24.3 | |
thunderbird | eq | 24.0 |
secunia.com/advisories/59760
secunia.com/advisories/60628
www.mozilla.org/security/announce/2014/mfsa2014-57.html
www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
www.securityfocus.com/bid/68820
www.securitytracker.com/id/1030619
www.securitytracker.com/id/1030620
bugzilla.mozilla.org/show_bug.cgi?id=1020205
security.gentoo.org/glsa/201504-01