Mozilla Firefox before 33.0 does not properly initialize memory for GIF images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers a sequence of rendering operations for truncated GIF data within a CANVAS element.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html | vendor advisory |
http://www.securityfocus.com/bid/70431 | vdb entry |
http://www.securitytracker.com/id/1031028 | vdb entry |
http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html | vendor advisory |
https://security.gentoo.org/glsa/201504-01 | vendor advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | |
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html | vendor advisory |
http://www.ubuntu.com/usn/USN-2372-1 | vendor advisory |
http://secunia.com/advisories/62022 | third party advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1063733 | |
http://secunia.com/advisories/62023 | third party advisory |
http://www.mozilla.org/security/announce/2014/mfsa2014-78.html | vendor advisory |