Search for vulnerabilities
Vulnerability details: VCID-t163-6jgd-aaaa
Vulnerability ID VCID-t163-6jgd-aaaa
Aliases CVE-2014-1490
Summary Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual Low http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
rhas Critical https://access.redhat.com/errata/RHSA-2014:0917
rhas Moderate https://access.redhat.com/errata/RHSA-2014:1246
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00864 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.00915 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.01287 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.01287 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.01287 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.01287 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.01287 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.01287 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.01287 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.01287 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.01287 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.01287 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.01287 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.01287 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.02364 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.02364 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.02364 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.02364 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
epss 0.03203 https://api.first.org/data/v1/epss?cve=CVE-2014-1490
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1060953
generic_textual MODERATE http://seclists.org/fulldisclosure/2014/Dec/23
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2014-1490
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
cvssv3.1 5.3 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
generic_textual HIGH http://www.securityfocus.com/archive/1/534161/100/0/threaded
generic_textual MODERATE http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Reference id Reference type URL
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129218.html
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
http://osvdb.org/102876
https://8pecxstudios.com/?page_id=44080
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1490.json
https://api.first.org/data/v1/epss?cve=CVE-2014-1490
https://bugzilla.mozilla.org/show_bug.cgi?id=930857
https://bugzilla.mozilla.org/show_bug.cgi?id=930874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/56706
http://secunia.com/advisories/56767
http://secunia.com/advisories/56787
http://secunia.com/advisories/56858
http://secunia.com/advisories/56888
http://secunia.com/advisories/56922
https://exchange.xforce.ibmcloud.com/vulnerabilities/90885
https://security.gentoo.org/glsa/201504-01
http://www.debian.org/security/2014/dsa-2858
http://www.mozilla.org/security/announce/2014/mfsa2014-12.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65335
http://www.securitytracker.com/id/1029717
http://www.securitytracker.com/id/1029720
http://www.securitytracker.com/id/1029721
http://www.ubuntu.com/usn/USN-2102-1
http://www.ubuntu.com/usn/USN-2102-2
http://www.ubuntu.com/usn/USN-2119-1
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
1060953 https://bugzilla.redhat.com/show_bug.cgi?id=1060953
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_ops_center:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
CVE-2014-1490 https://nvd.nist.gov/vuln/detail/CVE-2014-1490
mfsa2014-12 https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
RHSA-2014:0917 https://access.redhat.com/errata/RHSA-2014:0917
RHSA-2014:1246 https://access.redhat.com/errata/RHSA-2014:1246
USN-2102-1 https://usn.ubuntu.com/2102-1/
USN-2119-1 https://usn.ubuntu.com/2119-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2014-1490
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.73002
EPSS Score 0.00864
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.