Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.
https://security.gentoo.org/glsa/201504-01
https://exchange.xforce.ibmcloud.com/vulnerabilities/90890
https://bugzilla.mozilla.org/show_bug.cgi?id=942164
http://www.ubuntu.com/usn/USN-2119-1
http://www.ubuntu.com/usn/USN-2102-2
http://www.ubuntu.com/usn/USN-2102-1
http://www.securitytracker.com/id/1029721
http://www.securitytracker.com/id/1029720
http://www.securitytracker.com/id/1029717
http://www.securityfocus.com/bid/65334
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.mozilla.org/security/announce/2014/mfsa2014-08.html
http://www.debian.org/security/2014/dsa-2858
http://rhn.redhat.com/errata/RHSA-2014-0133.html
http://rhn.redhat.com/errata/RHSA-2014-0132.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129218.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html