MathML Polygon Rendering Vulnerability in Mozilla Firefox, Thunderbird, and SeaMonkey

MathML Polygon Rendering Vulnerability in Mozilla Firefox, Thunderbird, and SeaMonkey

CVE-2014-1508 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.

Learn more about our Cis Benchmark Audit For Mozilla Firefox.