Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:27913
[Rus]
Version
3
Class
patch
ALTXid
163765
Language
English
Severity
Critical
Title
ALT Linux -- security update for firefox-45.5.1-alt0.M70C.1
Description
Security update for firefox-45.5.1-alt0.M70C.1.
Family
unix
Platform
ALT Linux SPT 7.0
Product
firefox
Reference
VENDOR: otchet-po-obnovleniiam-ot-16112016
VENDOR: otchet-po-obnovleniiam-ot-16112016
Id:
otchet-po-obnovleniiam-ot-16112016
Reference:
https://cve.basealt.ru/otchet-po-obnovleniiam-ot-16112016.html
CVE: CVE-2016-5284
CVE: CVE-2016-5284
Id:
CVE-2016-5284
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284
Comment
: Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSSv3 Score:
7.4
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
CHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
CWE:
20 (Improper Input Validation)
References:
https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95 (MISC)
https://bugzilla.mozilla.org/show_bug.cgi?id=1303127 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
[dailydave] 20160915 Deep down the certificate pinning rabbit hole of "Tor Browser Exposed" (MLIST)
https://blog.mozilla.org/security/2016/09/16/update-on-add-on-pinning-vulnerability/ (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html (CONFIRM)
93049 (BID)
DSA-3674 (DEBIAN)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
RHSA-2016:1912 (REDHAT)
https://www.mozilla.org/security/advisories/mfsa2016-88/ (CONFIRM)
https://www.mozilla.org/security/advisories/mfsa2016-86/ (CONFIRM)
CVE: CVE-2016-5283
CVE: CVE-2016-5283
Id:
CVE-2016-5283
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5283
Comment
: Mozilla Firefox before 49.0 allows remote attackers to bypass the Same Origin Policy via a crafted fragment identifier in the SRC attribute of an IFRAME element, leading to insufficient restrictions on link-color information after a document is resized.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
284 (Improper Access Control)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=928187 (CONFIRM)
93052 (BID)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
CVE: CVE-2016-5282
CVE: CVE-2016-5282
Id:
CVE-2016-5282
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5282
Comment
: Mozilla Firefox before 49.0 does not properly restrict the scheme in favicon requests, which might allow remote attackers to obtain sensitive information via unspecified vectors, as demonstrated by a jar: URL for a favicon resource.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=932335 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
93052 (BID)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
CVE: CVE-2016-5281
CVE: CVE-2016-5281
Id:
CVE-2016-5281
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281
Comment
: Use-after-free vulnerability in the DOMSVGLength class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1284690 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
http://www.geeknik.net/7gr1u98b9 (MISC)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html (CONFIRM)
93049 (BID)
DSA-3674 (DEBIAN)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
RHSA-2016:1912 (REDHAT)
https://www.mozilla.org/security/advisories/mfsa2016-88/ (CONFIRM)
https://www.mozilla.org/security/advisories/mfsa2016-86/ (CONFIRM)
CVE: CVE-2016-5280
CVE: CVE-2016-5280
Id:
CVE-2016-5280
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280
Comment
: Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code via bidirectional text.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1289970 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html (CONFIRM)
93049 (BID)
DSA-3674 (DEBIAN)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
RHSA-2016:1912 (REDHAT)
https://www.mozilla.org/security/advisories/mfsa2016-88/ (CONFIRM)
https://www.mozilla.org/security/advisories/mfsa2016-86/ (CONFIRM)
CVE: CVE-2016-5279
CVE: CVE-2016-5279
Id:
CVE-2016-5279
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5279
Comment
: Mozilla Firefox before 49.0 allows user-assisted remote attackers to obtain sensitive full-pathname information during a local-file drag-and-drop operation via crafted JavaScript code.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSSv3 Score:
4.3
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1249522 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
93052 (BID)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
CVE: CVE-2016-5278
CVE: CVE-2016-5278
Id:
CVE-2016-5278
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278
Comment
: Heap-based buffer overflow in the nsBMPEncoder::AddImageFrame function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code via a crafted image data that is mishandled during the encoding of an image frame to an image.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1294677 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html (CONFIRM)
93049 (BID)
DSA-3674 (DEBIAN)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
RHSA-2016:1912 (REDHAT)
https://www.mozilla.org/security/advisories/mfsa2016-88/ (CONFIRM)
https://www.mozilla.org/security/advisories/mfsa2016-86/ (CONFIRM)
CVE: CVE-2016-5277
CVE: CVE-2016-5277
Id:
CVE-2016-5277
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277
Comment
: Use-after-free vulnerability in the nsRefreshDriver::Tick function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging improper interaction between timeline destruction and the Web Animations model implementation.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1291665 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html (CONFIRM)
93049 (BID)
DSA-3674 (DEBIAN)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
RHSA-2016:1912 (REDHAT)
https://www.mozilla.org/security/advisories/mfsa2016-88/ (CONFIRM)
https://www.mozilla.org/security/advisories/mfsa2016-86/ (CONFIRM)
CVE: CVE-2016-5276
CVE: CVE-2016-5276
Id:
CVE-2016-5276
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276
Comment
: Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1287721 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html (CONFIRM)
93049 (BID)
DSA-3674 (DEBIAN)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
RHSA-2016:1912 (REDHAT)
https://www.mozilla.org/security/advisories/mfsa2016-88/ (CONFIRM)
https://www.mozilla.org/security/advisories/mfsa2016-86/ (CONFIRM)
CVE: CVE-2016-5275
CVE: CVE-2016-5275
Id:
CVE-2016-5275
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5275
Comment
: Buffer overflow in the mozilla::gfx::FilterSupport::ComputeSourceNeededRegions function in Mozilla Firefox before 49.0 allows remote attackers to execute arbitrary code by leveraging improper interaction between empty filters and CANVAS element rendering.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1287316 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
93052 (BID)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
CVE: CVE-2016-5274
CVE: CVE-2016-5274
Id:
CVE-2016-5274
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274
Comment
: Use-after-free vulnerability in the nsFrameManager::CaptureFrameState function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between restyling and the Web Animations model implementation.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1282076 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html (CONFIRM)
93049 (BID)
DSA-3674 (DEBIAN)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
RHSA-2016:1912 (REDHAT)
https://www.mozilla.org/security/advisories/mfsa2016-88/ (CONFIRM)
https://www.mozilla.org/security/advisories/mfsa2016-86/ (CONFIRM)
CVE: CVE-2016-5273
CVE: CVE-2016-5273
Id:
CVE-2016-5273
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5273
Comment
: The mozilla::a11y::HyperTextAccessible::GetChildOffset function in the accessibility implementation in Mozilla Firefox before 49.0 allows remote attackers to execute arbitrary code via a crafted web site.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
284 (Improper Access Control)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1280387 (CONFIRM)
93052 (BID)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
CVE: CVE-2016-5272
CVE: CVE-2016-5272
Id:
CVE-2016-5272
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272
Comment
: The nsImageGeometryMixin class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 does not properly perform a cast of an unspecified variable during handling of INPUT elements, which allows remote attackers to execute arbitrary code via a crafted web site.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
20 (Improper Input Validation)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1297934 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html (CONFIRM)
93049 (BID)
DSA-3674 (DEBIAN)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
RHSA-2016:1912 (REDHAT)
https://www.mozilla.org/security/advisories/mfsa2016-88/ (CONFIRM)
https://www.mozilla.org/security/advisories/mfsa2016-86/ (CONFIRM)
CVE: CVE-2016-5271
CVE: CVE-2016-5271
Id:
CVE-2016-5271
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5271
Comment
: The PropertyProvider::GetSpacingInternal function in Mozilla Firefox before 49.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via text runs in conjunction with a "display: contents" Cascading Style Sheets (CSS) property.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CWE:
125 (Out-of-bounds Read)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1288946 (CONFIRM)
93052 (BID)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
CVE: CVE-2016-5270
CVE: CVE-2016-5270
Id:
CVE-2016-5270
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270
Comment
: Heap-based buffer overflow in the nsCaseTransformTextRunFactory::TransformString function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to cause a denial of service (boolean out-of-bounds write) or possibly have unspecified other impact via Unicode characters that are mishandled during text conversion.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1291016 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html (CONFIRM)
93049 (BID)
DSA-3674 (DEBIAN)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
RHSA-2016:1912 (REDHAT)
https://www.mozilla.org/security/advisories/mfsa2016-88/ (CONFIRM)
https://www.mozilla.org/security/advisories/mfsa2016-86/ (CONFIRM)
CVE: CVE-2016-5268
CVE: CVE-2016-5268
Id:
CVE-2016-5268
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5268
Comment
: Mozilla Firefox before 48.0 does not properly set the LINKABLE and URI_SAFE_FOR_UNTRUSTED_CONTENT flags of about: URLs that are used for error pages, which makes it easier for remote attackers to conduct spoofing attacks via a crafted URL, as demonstrated by misleading text after an about:neterror?d= substring.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
4.3
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CWE:
254 (Security Features)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-83.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1253673 (CONFIRM)
92260 (BID)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5267
CVE: CVE-2016-5267
Id:
CVE-2016-5267
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5267
Comment
: Mozilla Firefox before 48.0 on Android allows remote attackers to spoof the address bar via left-to-right characters in conjunction with a right-to-left character set.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
5.3
Attack vector:
NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
CWE:
20 (Improper Input Validation)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1284372 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-82.html (CONFIRM)
92260 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5266
CVE: CVE-2016-5266
Id:
CVE-2016-5266
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5266
Comment
: Mozilla Firefox before 48.0 does not properly restrict drag-and-drop (aka dataTransfer) actions for file: URIs, which allows user-assisted remote attackers to access local files via a crafted web site.
CVSSv2 Score:
5.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSSv3 Score:
8.1
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1226977 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-81.html (CONFIRM)
92260 (BID)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5265
CVE: CVE-2016-5265
Id:
CVE-2016-5265
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5265
Comment
: Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow user-assisted remote attackers to bypass the Same Origin Policy, and conduct Universal XSS (UXSS) attacks or read arbitrary files, by arranging for the presence of a crafted HTML document and a crafted shortcut file in the same local directory.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
CHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
CWE:
79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-80.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1278013 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
RHSA-2016:1551 (REDHAT)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
DSA-3640 (DEBIAN)
92258 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5264
CVE: CVE-2016-5264
Id:
CVE-2016-5264
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5264
Comment
: Use-after-free vulnerability in the nsNodeUtils::NativeAnonymousChildListChange function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG element that is mishandled during effect application.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-79.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1286183 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
RHSA-2016:1551 (REDHAT)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
DSA-3640 (DEBIAN)
92258 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5263
CVE: CVE-2016-5263
Id:
CVE-2016-5263
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5263
Comment
: The nsDisplayList::HitTest function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 mishandles rendering display transformation, which allows remote attackers to execute arbitrary code via a crafted web site that leverages "type confusion."
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
704 (Incorrect Type Conversion or Cast)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-78.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1276897 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
RHSA-2016:1551 (REDHAT)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
DSA-3640 (DEBIAN)
92258 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5262
CVE: CVE-2016-5262
Id:
CVE-2016-5262
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5262
Comment
: Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 process JavaScript event-handler attributes of a MARQUEE element within a sandboxed IFRAME element that lacks the sandbox="allow-scripts" attribute value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
6.1
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
CHANGED
Confidentiality impact:
LOW
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE:
79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1277475 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-76.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
RHSA-2016:1551 (REDHAT)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
DSA-3640 (DEBIAN)
92258 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5261
CVE: CVE-2016-5261
Id:
CVE-2016-5261
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5261
Comment
: Integer overflow in the WebSocketChannel class in the WebSockets subsystem in Mozilla Firefox before 48.0 and Firefox ESR < 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets that trigger incorrect buffer-resize operations during buffering.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
190 (Integer Overflow or Wraparound)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1287266 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-75.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html (CONFIRM)
92260 (BID)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
DSA-3674 (DEBIAN)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
RHSA-2016:1912 (REDHAT)
https://www.mozilla.org/security/advisories/mfsa2016-86/ (CONFIRM)
CVE: CVE-2016-5260
CVE: CVE-2016-5260
Id:
CVE-2016-5260
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5260
Comment
: Mozilla Firefox before 48.0 mishandles changes from 'INPUT type="password"' to 'INPUT type="text"' within a single Session Manager session, which might allow attackers to discover cleartext passwords by reading a session restoration file.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-74.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1280294 (CONFIRM)
92260 (BID)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5258
CVE: CVE-2016-5258
Id:
CVE-2016-5258
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5258
Comment
: Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-72.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1279146 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
RHSA-2016:1551 (REDHAT)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
DSA-3640 (DEBIAN)
92258 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5257
CVE: CVE-2016-5257
Id:
CVE-2016-5257
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257
Comment
: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4 and Thunderbird < 45.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1293347 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1288780 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1289280 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1294095 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1277213 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1287204 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1288555 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1294407 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1288588 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html (CONFIRM)
93049 (BID)
DSA-3690 (DEBIAN)
DSA-3674 (DEBIAN)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
RHSA-2016:1985 (REDHAT)
RHSA-2016:1912 (REDHAT)
https://www.mozilla.org/security/advisories/mfsa2016-88/ (CONFIRM)
https://www.mozilla.org/security/advisories/mfsa2016-86/ (CONFIRM)
CVE: CVE-2016-5256
CVE: CVE-2016-5256
Id:
CVE-2016-5256
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5256
Comment
: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1290244 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1296087 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1276413 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1282746 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1296078 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1297099 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1268034 (CONFIRM)
93052 (BID)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
CVE: CVE-2016-5255
CVE: CVE-2016-5255
Id:
CVE-2016-5255
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5255
Comment
: Use-after-free vulnerability in the js::PreliminaryObjectArray::sweep function in Mozilla Firefox before 48.0 allows remote attackers to execute arbitrary code via crafted JavaScript that is mishandled during incremental garbage collection.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1212356 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-71.html (CONFIRM)
92260 (BID)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5254
CVE: CVE-2016-5254
Id:
CVE-2016-5254
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5254
Comment
: Use-after-free vulnerability in the nsXULPopupManager::KeyDown function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by leveraging keyboard access to use the Alt key during selection of top-level menu items.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1266963 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-70.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
RHSA-2016:1551 (REDHAT)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
DSA-3640 (DEBIAN)
92261 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5253
CVE: CVE-2016-5253
Id:
CVE-2016-5253
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5253
Comment
: The Updater in Mozilla Firefox before 48.0 on Windows allows local users to write to arbitrary files via vectors involving the callback application-path parameter and a hard link.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
COMPLETE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:C/A:N
CVSSv3 Score:
4.7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-69.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1246944 (CONFIRM)
92260 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5252
CVE: CVE-2016-5252
Id:
CVE-2016-5252
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5252
Comment
: Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-67.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1268854 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
RHSA-2016:1551 (REDHAT)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
DSA-3640 (DEBIAN)
92261 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5251
CVE: CVE-2016-5251
Id:
CVE-2016-5251
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5251
Comment
: Mozilla Firefox before 48.0 allows remote attackers to spoof the location bar via crafted characters in the media type of a data: URL.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
4.3
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CWE:
20 (Improper Input Validation)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-66.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1255570 (CONFIRM)
92260 (BID)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-5250
CVE: CVE-2016-5250
Id:
CVE-2016-5250
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5250
Comment
: Mozilla Firefox before 48.0, Firefox ESR < 45.4 and Thunderbird < 45.4 allow remote attackers to obtain sensitive information about the previously retrieved page via Resource Timing API calls.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
4.3
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1254688 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-84.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html (CONFIRM)
92260 (BID)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
DSA-3674 (DEBIAN)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
RHSA-2016:1912 (REDHAT)
https://www.mozilla.org/security/advisories/mfsa2016-88/ (CONFIRM)
https://www.mozilla.org/security/advisories/mfsa2016-86/ (CONFIRM)
CVE: CVE-2016-2839
CVE: CVE-2016-2839
Id:
CVE-2016-2839
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2839
Comment
: Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 on Linux make cairo _cairo_surface_get_extents calls that do not properly interact with libav header allocation in FFmpeg 0.10, which allows remote attackers to cause a denial of service (application crash) via a crafted video.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CWE:
20 (Improper Input Validation)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1275339 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-65.html (CONFIRM)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
92261 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-2838
CVE: CVE-2016-2838
Id:
CVE-2016-2838
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2838
Comment
: Heap-based buffer overflow in the nsBidi::BracketData::AddOpening function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via directional content in an SVG document.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-64.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1279814 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
RHSA-2016:1551 (REDHAT)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
DSA-3640 (DEBIAN)
92261 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-2837
CVE: CVE-2016-2837
Id:
CVE-2016-2837
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2837
Comment
: Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
6.3
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
LOW
Availability impact:
LOW
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1274637 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-77.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
RHSA-2016:1551 (REDHAT)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
DSA-3640 (DEBIAN)
92258 (BID)
http://www.zerodayinitiative.com/advisories/ZDI-16-673 (MISC)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-2836
CVE: CVE-2016-2836
Id:
CVE-2016-2836
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836
Comment
: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to Http2Session::Shutdown and SpdySession31::Shutdown, and other vectors.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1249578 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1154923 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1282502 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1258079 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1257765 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=822081 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1283823 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-62.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1268626 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:2026 (SUSE)
DSA-3640 (DEBIAN)
RHSA-2016:1551 (REDHAT)
openSUSE-SU-2016:1964 (SUSE)
RHSA-2016:1809 (REDHAT)
92261 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-2835
CVE: CVE-2016-2835
Id:
CVE-2016-2835
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2835
Comment
: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1254106 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1264998 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1270537 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1222101 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1282246 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1280215 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1280443 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-62.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1251308 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1275582 (CONFIRM)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:2026 (SUSE)
openSUSE-SU-2016:1964 (SUSE)
92261 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-2834
CVE: CVE-2016-2834
Id:
CVE-2016-2834
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834
Comment
: Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
References:
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1241034 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-61.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1221620 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1241037 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1206283 (CONFIRM)
openSUSE-SU-2016:1557 (SUSE)
USN-2993-1 (UBUNTU)
1036057 (SECTRACK)
openSUSE-SU-2016:1552 (SUSE)
USN-3029-1 (UBUNTU)
SUSE-SU-2016:1691 (SUSE)
91072 (BID)
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html (CONFIRM)
DSA-3688 (DEBIAN)
RHSA-2016:2779 (REDHAT)
CVE: CVE-2016-2833
CVE: CVE-2016-2833
Id:
CVE-2016-2833
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2833
Comment
: Mozilla Firefox before 47.0 ignores Content Security Policy (CSP) directives for cross-domain Java applets, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted applet.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
6.1
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
CHANGED
Confidentiality impact:
LOW
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE:
79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=908933 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-60.html (CONFIRM)
openSUSE-SU-2016:1557 (SUSE)
USN-2993-1 (UBUNTU)
1036057 (SECTRACK)
openSUSE-SU-2016:1552 (SUSE)
CVE: CVE-2016-2832
CVE: CVE-2016-2832
Id:
CVE-2016-2832
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2832
Comment
: Mozilla Firefox before 47.0 allows remote attackers to discover the list of disabled plugins via a fingerprinting attack involving Cascading Style Sheets (CSS) pseudo-classes.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSSv3 Score:
4.3
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1025267 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-59.html (CONFIRM)
openSUSE-SU-2016:1557 (SUSE)
USN-2993-1 (UBUNTU)
1036057 (SECTRACK)
openSUSE-SU-2016:1552 (SUSE)
CVE: CVE-2016-2831
CVE: CVE-2016-2831
Id:
CVE-2016-2831
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831
Comment
: Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote attackers to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site.
CVSSv2 Score:
5.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
CHANGED
Confidentiality impact:
LOW
Integrity impact:
LOW
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H
CWE:
254 (Security Features)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1261933 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-58.html (CONFIRM)
DSA-3600 (DEBIAN)
openSUSE-SU-2016:1557 (SUSE)
USN-2993-1 (UBUNTU)
1036057 (SECTRACK)
openSUSE-SU-2016:1552 (SUSE)
RHSA-2016:1217 (REDHAT)
SUSE-SU-2016:1691 (SUSE)
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html (CONFIRM)
91075 (BID)
CVE: CVE-2016-2830
CVE: CVE-2016-2830
Id:
CVE-2016-2830
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2830
Comment
: Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSSv3 Score:
4.3
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-63.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1255270 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
RHSA-2016:1551 (REDHAT)
USN-3044-1 (UBUNTU)
openSUSE-SU-2016:1964 (SUSE)
openSUSE-SU-2016:2026 (SUSE)
DSA-3640 (DEBIAN)
92261 (BID)
GLSA-201701-15 (GENTOO)
1036508 (SECTRACK)
CVE: CVE-2016-2829
CVE: CVE-2016-2829
Id:
CVE-2016-2829
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2829
Comment
: Mozilla Firefox before 47.0 allows remote attackers to spoof permission notifications via a crafted web site that rapidly triggers permission requests, as demonstrated by the microphone permission or the geolocation permission.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CWE:
284 (Improper Access Control)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1248329 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-57.html (CONFIRM)
openSUSE-SU-2016:1557 (SUSE)
USN-2993-1 (UBUNTU)
1036057 (SECTRACK)
openSUSE-SU-2016:1552 (SUSE)
CVE: CVE-2016-2828
CVE: CVE-2016-2828
Id:
CVE-2016-2828
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828
Comment
: Use-after-free vulnerability in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via WebGL content that triggers texture access after destruction of the texture's recycle pool.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
CWE-Other ()
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1223810 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-56.html (CONFIRM)
DSA-3600 (DEBIAN)
openSUSE-SU-2016:1557 (SUSE)
USN-2993-1 (UBUNTU)
1036057 (SECTRACK)
openSUSE-SU-2016:1552 (SUSE)
RHSA-2016:1217 (REDHAT)
SUSE-SU-2016:1691 (SUSE)
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html (CONFIRM)
91075 (BID)
CVE: CVE-2016-2827
CVE: CVE-2016-2827
Id:
CVE-2016-2827
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2827
Comment
: The mozilla::net::IsValidReferrerPolicy function in Mozilla Firefox before 49.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a Content Security Policy (CSP) referrer directive with zero values.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CWE:
125 (Out-of-bounds Read)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1289085 (CONFIRM)
93052 (BID)
GLSA-201701-15 (GENTOO)
1036852 (SECTRACK)
https://www.mozilla.org/security/advisories/mfsa2016-85/ (CONFIRM)
CVE: CVE-2016-2826
CVE: CVE-2016-2826
Id:
CVE-2016-2826
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2826
Comment
: The maintenance service in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 on Windows does not prevent MAR extracted-file modification during updater execution, which might allow local users to gain privileges via a Trojan horse file.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-55.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1237219 (CONFIRM)
1036057 (SECTRACK)
91075 (BID)
CVE: CVE-2016-2825
CVE: CVE-2016-2825
Id:
CVE-2016-2825
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2825
Comment
: Mozilla Firefox before 47.0 allows remote attackers to bypass the Same Origin Policy and modify the location.host property via an invalid data: URL.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CWE:
284 (Improper Access Control)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1193093 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-54.html (CONFIRM)
openSUSE-SU-2016:1557 (SUSE)
USN-2993-1 (UBUNTU)
1036057 (SECTRACK)
openSUSE-SU-2016:1552 (SUSE)
CVE: CVE-2016-2824
CVE: CVE-2016-2824
Id:
CVE-2016-2824
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2824
Comment
: The TSymbolTableLevel class in ANGLE, as used in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 on Windows, allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact by triggering use of a WebGL shader that writes to an array.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-53.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1248580 (CONFIRM)
openSUSE-SU-2016:1557 (SUSE)
1036057 (SECTRACK)
openSUSE-SU-2016:1552 (SUSE)
SUSE-SU-2016:1691 (SUSE)
91075 (BID)
CVE: CVE-2016-2822
CVE: CVE-2016-2822
Id:
CVE-2016-2822
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2822
Comment
: Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to spoof the address bar via a SELECT element with a persistent menu.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CWE:
284 (Improper Access Control)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-52.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1273129 (CONFIRM)
DSA-3600 (DEBIAN)
openSUSE-SU-2016:1557 (SUSE)
USN-2993-1 (UBUNTU)
1036057 (SECTRACK)
openSUSE-SU-2016:1552 (SUSE)
RHSA-2016:1217 (REDHAT)
SUSE-SU-2016:1691 (SUSE)
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html (CONFIRM)
91075 (BID)
CVE: CVE-2016-2821
CVE: CVE-2016-2821
Id:
CVE-2016-2821
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821
Comment
: Use-after-free vulnerability in the mozilla::dom::Element class in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2, when contenteditable mode is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering deletion of DOM elements that were created in the editor.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
CWE-Other ()
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-51.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1271460 (CONFIRM)
DSA-3600 (DEBIAN)
openSUSE-SU-2016:1557 (SUSE)
USN-2993-1 (UBUNTU)
1036057 (SECTRACK)
openSUSE-SU-2016:1552 (SUSE)
RHSA-2016:1217 (REDHAT)
SUSE-SU-2016:1691 (SUSE)
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html (CONFIRM)
91075 (BID)
CVE: CVE-2016-2820
CVE: CVE-2016-2820
Id:
CVE-2016-2820
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2820
Comment
: The Firefox Health Reports (aka FHR or about:healthreport) feature in Mozilla Firefox before 46.0 does not properly restrict the origin of events, which makes it easier for remote attackers to modify sharing preferences by leveraging access to the remote-report IFRAME element.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
4.3
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CWE:
284 (Improper Access Control)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-48.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=870870 (CONFIRM)
openSUSE-SU-2016:1211 (SUSE)
USN-2936-1 (UBUNTU)
USN-2936-2 (UBUNTU)
openSUSE-SU-2016:1251 (SUSE)
USN-2936-3 (UBUNTU)
1035692 (SECTRACK)
GLSA-201701-15 (GENTOO)
CVE: CVE-2016-2819
CVE: CVE-2016-2819
Id:
CVE-2016-2819
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2819
Comment
: Heap-based buffer overflow in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via foreign-context HTML5 fragments, as demonstrated by fragments within an SVG element.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-50.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1270381 (CONFIRM)
DSA-3600 (DEBIAN)
openSUSE-SU-2016:1557 (SUSE)
USN-2993-1 (UBUNTU)
1036057 (SECTRACK)
openSUSE-SU-2016:1552 (SUSE)
RHSA-2016:1217 (REDHAT)
SUSE-SU-2016:1691 (SUSE)
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html (CONFIRM)
91075 (BID)
44293 (EXPLOIT-DB)
CVE: CVE-2016-2818
CVE: CVE-2016-2818
Id:
CVE-2016-2818
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818
Comment
: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1261230 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1265577 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1267130 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1256968 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1256739 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1263384 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1273701 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1234147 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1273202 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1256493 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1261752 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1264575 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-49.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1269729 (CONFIRM)
DSA-3600 (DEBIAN)
1036057 (SECTRACK)
openSUSE-SU-2016:1557 (SUSE)
USN-2993-1 (UBUNTU)
openSUSE-SU-2016:1552 (SUSE)
RHSA-2016:1217 (REDHAT)
openSUSE-SU-2016:1767 (SUSE)
openSUSE-SU-2016:1769 (SUSE)
RHSA-2016:1392 (REDHAT)
openSUSE-SU-2016:1778 (SUSE)
SUSE-SU-2016:1691 (SUSE)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html (CONFIRM)
DSA-3647 (DEBIAN)
91075 (BID)
USN-3023-1 (UBUNTU)
CVE: CVE-2016-2817
CVE: CVE-2016-2817
Id:
CVE-2016-2817
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2817
Comment
: The WebExtension sandbox feature in browser/components/extensions/ext-tabs.js in Mozilla Firefox before 46.0 does not properly restrict principal inheritance during chrome.tabs.create and chrome.tabs.update API calls, which allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted extension that accesses a (1) javascript: or (2) data: URL.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
5.4
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1227462 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-46.html (CONFIRM)
openSUSE-SU-2016:1211 (SUSE)
USN-2936-1 (UBUNTU)
USN-2936-2 (UBUNTU)
openSUSE-SU-2016:1251 (SUSE)
USN-2936-3 (UBUNTU)
1035692 (SECTRACK)
GLSA-201701-15 (GENTOO)
CVE: CVE-2016-2816
CVE: CVE-2016-2816
Id:
CVE-2016-2816
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2816
Comment
: Mozilla Firefox before 46.0 allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via the multipart/x-mixed-replace content type.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CWE:
284 (Improper Access Control)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1223743 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-45.html (CONFIRM)
openSUSE-SU-2016:1211 (SUSE)
USN-2936-1 (UBUNTU)
USN-2936-2 (UBUNTU)
openSUSE-SU-2016:1251 (SUSE)
USN-2936-3 (UBUNTU)
1035692 (SECTRACK)
GLSA-201701-15 (GENTOO)
CVE: CVE-2016-2815
CVE: CVE-2016-2815
Id:
CVE-2016-2815
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2815
Comment
: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1245743 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1243466 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-49.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1271037 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1241896 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1242798 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1264300 (CONFIRM)
openSUSE-SU-2016:1557 (SUSE)
USN-2993-1 (UBUNTU)
1036057 (SECTRACK)
openSUSE-SU-2016:1552 (SUSE)
openSUSE-SU-2016:1767 (SUSE)
openSUSE-SU-2016:1769 (SUSE)
openSUSE-SU-2016:1778 (SUSE)
SUSE-SU-2016:1691 (SUSE)
91075 (BID)
CVE: CVE-2016-2814
CVE: CVE-2016-2814
Id:
CVE-2016-2814
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814
Comment
: Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-44.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1254721 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html (CONFIRM)
DSA-3559 (DEBIAN)
USN-2936-3 (UBUNTU)
1035692 (SECTRACK)
SUSE-SU-2016:1352 (SUSE)
SUSE-SU-2016:1374 (SUSE)
openSUSE-SU-2016:1211 (SUSE)
RHSA-2016:0695 (REDHAT)
USN-2936-1 (UBUNTU)
USN-2936-2 (UBUNTU)
openSUSE-SU-2016:1251 (SUSE)
SUSE-SU-2016:1258 (SUSE)
GLSA-201701-15 (GENTOO)
CVE: CVE-2016-2813
CVE: CVE-2016-2813
Id:
CVE-2016-2813
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2813
Comment
: Mozilla Firefox before 46.0 on Android does not properly restrict JavaScript access to orientation and motion data, which allows remote attackers to obtain sensitive information about a device's physical environment, and possibly discover PIN values, via a crafted web site, a similar issue to CVE-2016-1780.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1197901 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-43.html (CONFIRM)
http://dl.acm.org/citation.cfm?id=2714650 (MISC)
openSUSE-SU-2016:1251 (SUSE)
1035692 (SECTRACK)
GLSA-201701-15 (GENTOO)
CVE: CVE-2016-2812
CVE: CVE-2016-2812
Id:
CVE-2016-2812
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2812
Comment
: Race condition in the get implementation in the ServiceWorkerManager class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.
CVSSv2 Score:
5.1
Access vector:
NETWORK
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1261776 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-42.html (CONFIRM)
openSUSE-SU-2016:1211 (SUSE)
USN-2936-1 (UBUNTU)
USN-2936-2 (UBUNTU)
openSUSE-SU-2016:1251 (SUSE)
USN-2936-3 (UBUNTU)
1035692 (SECTRACK)
GLSA-201701-15 (GENTOO)
CVE: CVE-2016-2811
CVE: CVE-2016-2811
Id:
CVE-2016-2811
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2811
Comment
: Use-after-free vulnerability in the ServiceWorkerInfo class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code via vectors related to the BeginReading method.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
CWE-Other ()
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1252330 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-42.html (CONFIRM)
openSUSE-SU-2016:1211 (SUSE)
USN-2936-1 (UBUNTU)
USN-2936-2 (UBUNTU)
openSUSE-SU-2016:1251 (SUSE)
USN-2936-3 (UBUNTU)
1035692 (SECTRACK)
GLSA-201701-15 (GENTOO)
CVE: CVE-2016-2810
CVE: CVE-2016-2810
Id:
CVE-2016-2810
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2810
Comment
: Mozilla Firefox before 46.0 on Android before 5.0 allows attackers to bypass intended Signature access requirements via a crafted application that leverages content-provider permissions, as demonstrated by reading the browser history or a saved password.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSSv3 Score:
5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1229681 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-41.html (CONFIRM)
openSUSE-SU-2016:1251 (SUSE)
1035692 (SECTRACK)
GLSA-201701-15 (GENTOO)
CVE: CVE-2016-2809
CVE: CVE-2016-2809
Id:
CVE-2016-2809
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2809
Comment
: The Mozilla Maintenance Service updater in Mozilla Firefox before 46.0 on Windows allows user-assisted remote attackers to delete arbitrary files by leveraging certain local file execution.
CVSSv2 Score:
5.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:P
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-40.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1212939 (CONFIRM)
openSUSE-SU-2016:1251 (SUSE)
1035692 (SECTRACK)
GLSA-201701-15 (GENTOO)
CVE: CVE-2016-2808
CVE: CVE-2016-2808
Id:
CVE-2016-2808
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808
Comment
: The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.
CVSSv2 Score:
5.1
Access vector:
NETWORK
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1246061 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-47.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html (CONFIRM)
DSA-3559 (DEBIAN)
USN-2936-3 (UBUNTU)
1035692 (SECTRACK)
SUSE-SU-2016:1352 (SUSE)
SUSE-SU-2016:1374 (SUSE)
openSUSE-SU-2016:1211 (SUSE)
RHSA-2016:0695 (REDHAT)
USN-2936-1 (UBUNTU)
USN-2936-2 (UBUNTU)
openSUSE-SU-2016:1251 (SUSE)
SUSE-SU-2016:1258 (SUSE)
GLSA-201701-15 (GENTOO)
CVE: CVE-2016-2807
CVE: CVE-2016-2807
Id:
CVE-2016-2807
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807
Comment
: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-39.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1254622 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1254876 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1187420 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1252707 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1254164 (CONFIRM)
openSUSE-SU-2016:1767 (SUSE)
openSUSE-SU-2016:1769 (SUSE)
openSUSE-SU-2016:1778 (SUSE)
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html (CONFIRM)
RHSA-2016:1041 (REDHAT)
DSA-3559 (DEBIAN)
USN-2936-3 (UBUNTU)
1035692 (SECTRACK)
SUSE-SU-2016:1352 (SUSE)
SUSE-SU-2016:1374 (SUSE)
openSUSE-SU-2016:1211 (SUSE)
RHSA-2016:0695 (REDHAT)
USN-2936-1 (UBUNTU)
USN-2936-2 (UBUNTU)
openSUSE-SU-2016:1251 (SUSE)
SUSE-SU-2016:1258 (SUSE)
DSA-3576 (DEBIAN)
USN-2973-1 (UBUNTU)
GLSA-201701-15 (GENTOO)
CVE: CVE-2016-2806
CVE: CVE-2016-2806
Id:
CVE-2016-2806
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2806
Comment
: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1212328 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1256065 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1228882 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1238592 (CONFIRM)
http://www.mozilla.org/security/announce/2016/mfsa2016-39.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1254122 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1253099 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1255949 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1251922 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1231919 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1260439 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1242810 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1258231 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1242668 (CONFIRM)
DSA-3601 (DEBIAN)
openSUSE-SU-2016:1767 (SUSE)
openSUSE-SU-2016:1769 (SUSE)
openSUSE-SU-2016:1778 (SUSE)
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html (CONFIRM)
1035692 (SECTRACK)
openSUSE-SU-2016:1211 (SUSE)
USN-2936-2 (UBUNTU)
openSUSE-SU-2016:1251 (SUSE)
USN-2936-3 (UBUNTU)
RHSA-2016:0695 (REDHAT)
USN-2936-1 (UBUNTU)
GLSA-201701-15 (GENTOO)
CVE: CVE-2016-2804
CVE: CVE-2016-2804
Id:
CVE-2016-2804
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2804
Comment
: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
http://www.mozilla.org/security/announce/2016/mfsa2016-39.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1229855 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1255298 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1141382 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1240880 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1249183 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=1155328 (CONFIRM)
USN-2936-3 (UBUNTU)
1035692 (SECTRACK)
openSUSE-SU-2016:1211 (SUSE)
USN-2936-1 (UBUNTU)
USN-2936-2 (UBUNTU)
openSUSE-SU-2016:1251 (SUSE)
GLSA-201701-15 (GENTOO)
Content available only for registered users!
ovaldb@altx-soft.com