UBUNTU-CVE-2014-1526

Source
https://ubuntu.com/security/CVE-2014-1526
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-1526.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2014-1526
Upstream
  • CVE-2014-1526
Downstream
Related
Published
2014-04-29T00:00:00Z
Modified
2025-09-08T16:43:08Z
Severity
  • Ubuntu - medium
Summary
[none]
Details

The XrayWrapper implementation in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that is visited in the debugger, leading to unwrapping operations and calls to DOM methods on the unwrapped objects.

References

Affected packages

Ubuntu:14.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@29.0+build1-0ubuntu0.14.04.2?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
29.0+build1-0ubuntu0.14.04.2

Affected versions

24.*

24.0+build1-0ubuntu1

25.*

25.0+build3-0ubuntu0.13.10.1

28.*

28.0~b2+build1-0ubuntu2
28.0+build1-0ubuntu1
28.0+build2-0ubuntu1
28.0+build2-0ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "29.0+build1-0ubuntu0.14.04.2",
            "binary_name": "firefox"
        },
        {
            "binary_version": "29.0+build1-0ubuntu0.14.04.2",
            "binary_name": "firefox-dev"
        },
        {
            "binary_version": "29.0+build1-0ubuntu0.14.04.2",
            "binary_name": "firefox-globalmenu"
        },
        {
            "binary_version": "29.0+build1-0ubuntu0.14.04.2",
            "binary_name": "firefox-mozsymbols"
        },
        {
            "binary_version": "29.0+build1-0ubuntu0.14.04.2",
            "binary_name": "firefox-testsuite"
        }
    ],
    "availability": "No subscription required"
}