Search for vulnerabilities
Vulnerability details: VCID-qsg8-1rvk-aaae
Vulnerability ID VCID-qsg8-1rvk-aaae
Aliases CVE-2014-1477
Summary CVE-2014-1477 Mozilla: Miscellaneous memory safety hazards (rv:24.3) (MFSA 2014-01)
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
rhas Critical https://access.redhat.com/errata/RHSA-2014:0132
rhas Important https://access.redhat.com/errata/RHSA-2014:0133
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.01037 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.01263 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.01263 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.01263 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.01263 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.01263 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.01263 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.01263 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.01263 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.01263 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.01263 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.01263 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.05279 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.05279 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
epss 0.05279 https://api.first.org/data/v1/epss?cve=CVE-2014-1477
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=1060938
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2014-1477
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2014-1477
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2014-1477
generic_textual critical https://www.mozilla.org/en-US/security/advisories/mfsa2014-01
cvssv3.1 8.8 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Reference id Reference type URL
http://download.novell.com/Download?buildid=VYQsgaFpQ2k
http://download.novell.com/Download?buildid=Y2fux-JW1Qc
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129218.html
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
http://osvdb.org/102864
http://rhn.redhat.com/errata/RHSA-2014-0132.html
http://rhn.redhat.com/errata/RHSA-2014-0133.html
https://8pecxstudios.com/?page_id=44080
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1477.json
https://api.first.org/data/v1/epss?cve=CVE-2014-1477
https://bugzilla.mozilla.org/show_bug.cgi?id=921470
https://bugzilla.mozilla.org/show_bug.cgi?id=925896
https://bugzilla.mozilla.org/show_bug.cgi?id=936808
https://bugzilla.mozilla.org/show_bug.cgi?id=937132
https://bugzilla.mozilla.org/show_bug.cgi?id=937697
https://bugzilla.mozilla.org/show_bug.cgi?id=945334
https://bugzilla.mozilla.org/show_bug.cgi?id=945939
https://bugzilla.mozilla.org/show_bug.cgi?id=950000
https://bugzilla.mozilla.org/show_bug.cgi?id=950438
https://bugzilla.mozilla.org/show_bug.cgi?id=951366
https://bugzilla.mozilla.org/show_bug.cgi?id=953114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
http://secunia.com/advisories/56706
http://secunia.com/advisories/56761
http://secunia.com/advisories/56763
http://secunia.com/advisories/56767
http://secunia.com/advisories/56787
http://secunia.com/advisories/56858
http://secunia.com/advisories/56888
https://exchange.xforce.ibmcloud.com/vulnerabilities/90899
https://security.gentoo.org/glsa/201504-01
http://www.debian.org/security/2014/dsa-2858
http://www.mozilla.org/security/announce/2014/mfsa2014-01.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/65317
http://www.securitytracker.com/id/1029717
http://www.securitytracker.com/id/1029720
http://www.securitytracker.com/id/1029721
http://www.ubuntu.com/usn/USN-2102-1
http://www.ubuntu.com/usn/USN-2102-2
http://www.ubuntu.com/usn/USN-2119-1
1060938 https://bugzilla.redhat.com/show_bug.cgi?id=1060938
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
CVE-2014-1477 https://nvd.nist.gov/vuln/detail/CVE-2014-1477
mfsa2014-01 https://www.mozilla.org/en-US/security/advisories/mfsa2014-01
RHSA-2014:0132 https://access.redhat.com/errata/RHSA-2014:0132
RHSA-2014:0133 https://access.redhat.com/errata/RHSA-2014:0133
USN-2102-1 https://usn.ubuntu.com/2102-1/
USN-2119-1 https://usn.ubuntu.com/2119-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2014-1477
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2014-1477
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2014-1477
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.72821
EPSS Score 0.00852
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.