Lyrie
Critical CVE
CVSS 9.83 sources verified·1 min read
By Lyrie Threat Intelligence·5/6/2026

CRITICAL: CVE-2014-1532 (CVSS 9.8) — mozilla firefox

CVE: CVE-2014-1532

CVSS: 9.8 (3.1) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: CRITICAL

Status: Critical advisory

Affected

  • mozilla firefox
  • mozilla seamonkey
  • mozilla thunderbird
  • fedoraproject fedora
  • canonical ubuntu linux

Summary

Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.

Verified Sources

References

  • http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html
  • http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
  • http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html
  • http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html
  • http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html
  • http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html
  • http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html
  • http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html
  • http://rhn.redhat.com/errata/RHSA-2014-0448.html
  • http://rhn.redhat.com/errata/RHSA-2014-0449.html

_Validated by the Lyrie Threat Intelligence Pipeline — 3 independent sources confirmed before publication. No speculation._

Lyrie Verdict

A vulnerability of this severity is exactly what Lyrie's anti-rogue-AI defense is built for: continuous, autonomous monitoring that doesn't wait for human reaction time.

Validated sources

  1. [1]NVD
  2. [2]GitHub Advisory
  3. [3]MITRE