ALT-BU-2015-2462-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-3808
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not reject a zero length, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- 74628
- 74628
- http://www.wireshark.org/security/wnpa-sec-2015-12.html
- http://www.wireshark.org/security/wnpa-sec-2015-12.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3809
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not properly track the current offset, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- DSA-3277
- DSA-3277
- 74632
- 74632
- http://www.wireshark.org/security/wnpa-sec-2015-12.html
- http://www.wireshark.org/security/wnpa-sec-2015-12.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3810
epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 74629
- 74629
- http://www.wireshark.org/security/wnpa-sec-2015-13.html
- http://www.wireshark.org/security/wnpa-sec-2015-13.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10989
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10989
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4ee6bcbd2e03a25f1e6b0239558d9edeaf8040c0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4ee6bcbd2e03a25f1e6b0239558d9edeaf8040c0
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3811
epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.
- RHSA-2017:0631
- RHSA-2017:0631
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.wireshark.org/security/wnpa-sec-2015-14.html
- http://www.wireshark.org/security/wnpa-sec-2015-14.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10978
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10978
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6fc6aa0b4efc1a1c3d7a2e3b5189e888fb6ccc2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6fc6aa0b4efc1a1c3d7a2e3b5189e888fb6ccc2
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3812
Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.
- RHSA-2017:0631
- RHSA-2017:0631
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 74637
- 74637
- http://www.wireshark.org/security/wnpa-sec-2015-15.html
- http://www.wireshark.org/security/wnpa-sec-2015-15.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11088
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11088
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b8ccc2a6add29823a0ff0492fc50372449007e7b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b8ccc2a6add29823a0ff0492fc50372449007e7b
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3813
The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
- RHSA-2017:0631
- RHSA-2017:0631
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 74633
- 74633
- http://www.wireshark.org/security/wnpa-sec-2015-16.html
- http://www.wireshark.org/security/wnpa-sec-2015-16.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11129
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11129
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c35f2ccb4433718416551cc7a85afb0860529d57
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c35f2ccb4433718416551cc7a85afb0860529d57
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3814
The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 74631
- 74631
- http://www.wireshark.org/security/wnpa-sec-2015-17.html
- http://www.wireshark.org/security/wnpa-sec-2015-17.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11110
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11110
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e243b0041328980a9bbd43bb8a8166d7422f9096
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e243b0041328980a9bbd43bb8a8166d7422f9096
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3815
The detect_version function in wiretap/logcat.c in the Android Logcat file parser in Wireshark 1.12.x before 1.12.5 does not check the length of the payload, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a packet with a crafted payload, as demonstrated by a length of zero, a different vulnerability than CVE-2015-3906.
- DSA-3277
- DSA-3277
- 74630
- 74630
- http://www.wireshark.org/security/wnpa-sec-2015-18.html
- http://www.wireshark.org/security/wnpa-sec-2015-18.html
- https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html
- https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3906
The logcat_dump_text function in wiretap/logcat.c in the Android Logcat file parser in Wireshark 1.12.x before 1.12.5 does not properly handle a lack of \0 termination, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted message in a packet, a different vulnerability than CVE-2015-3815.
- 74837
- 74837
- http://www.wireshark.org/security/wnpa-sec-2015-18.html
- http://www.wireshark.org/security/wnpa-sec-2015-18.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d
- GLSA-201510-03
- GLSA-201510-03
Closed vulnerabilities
BDU:2015-11141
Уязвимости браузера Firefox, позволяющие нарушителю выполнить произвольный код
BDU:2021-03335
Уязвимость браузера Mozilla Firefox, вызванная переполнением буфера, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2011-3079
The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168, as used in Mozilla Firefox before 38.0 and other products, does not properly validate messages, which has unspecified impact and attack vectors.
- http://code.google.com/p/chromium/issues/detail?id=117627
- http://googlechromereleases.blogspot.com/2012/04/stable-channel-update_30.html
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0934
- 81645
- RHSA-2015:1012
- 48992
- DSA-3260
- http://www.mozilla.org/security/announce/2015/mfsa2015-57.html
- 53309
- 1027001
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087565
- chrome-ipc-validation-code-execution(75271)
- oval:org.mitre.oval:def:14964
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- http://code.google.com/p/chromium/issues/detail?id=117627
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- oval:org.mitre.oval:def:14964
- chrome-ipc-validation-code-execution(75271)
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087565
- 1027001
- 53309
- http://www.mozilla.org/security/announce/2015/mfsa2015-57.html
- DSA-3260
- 48992
- RHSA-2015:1012
- 81645
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0892
- http://googlechromereleases.blogspot.com/2012/04/stable-channel-update_30.html
Modified: 2024-11-21
CVE-2015-2708
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:0892
- SUSE-SU-2015:0960
- SUSE-SU-2015:0960
- SUSE-SU-2015:0978
- SUSE-SU-2015:0978
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- RHSA-2015:0988
- RHSA-2015:0988
- RHSA-2015:1012
- RHSA-2015:1012
- DSA-3260
- DSA-3260
- DSA-3264
- DSA-3264
- http://www.mozilla.org/security/announce/2015/mfsa2015-46.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-46.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74615
- 74615
- USN-2602-1
- USN-2602-1
- USN-2603-1
- USN-2603-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1120655
- https://bugzilla.mozilla.org/show_bug.cgi?id=1120655
- https://bugzilla.mozilla.org/show_bug.cgi?id=1143299
- https://bugzilla.mozilla.org/show_bug.cgi?id=1143299
- https://bugzilla.mozilla.org/show_bug.cgi?id=1151139
- https://bugzilla.mozilla.org/show_bug.cgi?id=1151139
- https://bugzilla.mozilla.org/show_bug.cgi?id=1152177
- https://bugzilla.mozilla.org/show_bug.cgi?id=1152177
- GLSA-201605-06
- GLSA-201605-06
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
Modified: 2024-11-21
CVE-2015-2709
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- SUSE-SU-2015:0960
- SUSE-SU-2015:0960
- SUSE-SU-2015:0978
- SUSE-SU-2015:0978
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- RHSA-2015:1012
- RHSA-2015:1012
- http://www.mozilla.org/security/announce/2015/mfsa2015-46.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-46.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74615
- 74615
- USN-2602-1
- USN-2602-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111251
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111251
- https://bugzilla.mozilla.org/show_bug.cgi?id=1117977
- https://bugzilla.mozilla.org/show_bug.cgi?id=1117977
- https://bugzilla.mozilla.org/show_bug.cgi?id=1128064
- https://bugzilla.mozilla.org/show_bug.cgi?id=1128064
- https://bugzilla.mozilla.org/show_bug.cgi?id=1135066
- https://bugzilla.mozilla.org/show_bug.cgi?id=1135066
- https://bugzilla.mozilla.org/show_bug.cgi?id=1143194
- https://bugzilla.mozilla.org/show_bug.cgi?id=1143194
- https://bugzilla.mozilla.org/show_bug.cgi?id=1146101
- https://bugzilla.mozilla.org/show_bug.cgi?id=1146101
- https://bugzilla.mozilla.org/show_bug.cgi?id=1149526
- https://bugzilla.mozilla.org/show_bug.cgi?id=1149526
- https://bugzilla.mozilla.org/show_bug.cgi?id=1153688
- https://bugzilla.mozilla.org/show_bug.cgi?id=1153688
- https://bugzilla.mozilla.org/show_bug.cgi?id=1155474
- https://bugzilla.mozilla.org/show_bug.cgi?id=1155474
- GLSA-201605-06
- GLSA-201605-06
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
Modified: 2024-11-21
CVE-2015-2710
Heap-based buffer overflow in the SVGTextFrame class in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code via crafted SVG graphics data in conjunction with a crafted Cascading Style Sheets (CSS) token sequence.
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:0892
- SUSE-SU-2015:0960
- SUSE-SU-2015:0960
- SUSE-SU-2015:0978
- SUSE-SU-2015:0978
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- RHSA-2015:0988
- RHSA-2015:0988
- RHSA-2015:1012
- RHSA-2015:1012
- DSA-3260
- DSA-3260
- DSA-3264
- DSA-3264
- http://www.mozilla.org/security/announce/2015/mfsa2015-48.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-48.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- USN-2603-1
- USN-2603-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1149542
- https://bugzilla.mozilla.org/show_bug.cgi?id=1149542
- GLSA-201605-06
- GLSA-201605-06
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
Modified: 2024-11-21
CVE-2015-2711
Mozilla Firefox before 38.0 does not recognize a referrer policy delivered by a referrer META element in cases of context-menu navigation and middle-click navigation, which allows remote attackers to obtain sensitive information by reading web-server Referer logs that contain private data in a URL, as demonstrated by a private path component.
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- http://www.mozilla.org/security/announce/2015/mfsa2015-49.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-49.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1113431
- https://bugzilla.mozilla.org/show_bug.cgi?id=1113431
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-2712
The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- http://www.mozilla.org/security/announce/2015/mfsa2015-50.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-50.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1152280
- https://bugzilla.mozilla.org/show_bug.cgi?id=1152280
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-2713
Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:0892
- SUSE-SU-2015:0960
- SUSE-SU-2015:0960
- SUSE-SU-2015:0978
- SUSE-SU-2015:0978
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- RHSA-2015:0988
- RHSA-2015:0988
- RHSA-2015:1012
- RHSA-2015:1012
- DSA-3260
- DSA-3260
- DSA-3264
- DSA-3264
- http://www.mozilla.org/security/announce/2015/mfsa2015-51.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-51.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- USN-2603-1
- USN-2603-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1153478
- https://bugzilla.mozilla.org/show_bug.cgi?id=1153478
- GLSA-201605-06
- GLSA-201605-06
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
Modified: 2024-11-21
CVE-2015-2715
Race condition in the nsThreadManager::RegisterCurrentThread function in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) by leveraging improper Media Decoder Thread creation at the time of a shutdown.
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- http://www.mozilla.org/security/announce/2015/mfsa2015-53.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-53.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=988698
- https://bugzilla.mozilla.org/show_bug.cgi?id=988698
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-2716
Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:0892
- SUSE-SU-2015:0960
- SUSE-SU-2015:0960
- SUSE-SU-2015:0978
- SUSE-SU-2015:0978
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- RHSA-2015:0988
- RHSA-2015:0988
- RHSA-2015:1012
- RHSA-2015:1012
- DSA-3260
- DSA-3260
- DSA-3264
- DSA-3264
- http://www.mozilla.org/security/announce/2015/mfsa2015-54.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-54.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- USN-2603-1
- USN-2603-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1140537
- https://bugzilla.mozilla.org/show_bug.cgi?id=1140537
- https://hg.mozilla.org/releases/mozilla-esr31/rev/2f3e78643f5c
- https://hg.mozilla.org/releases/mozilla-esr31/rev/2f3e78643f5c
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- GLSA-201605-06
- GLSA-201605-06
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-20
Modified: 2024-11-21
CVE-2015-2717
Integer overflow in libstagefright in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and out-of-bounds read) via an MP4 video file containing invalid metadata.
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- http://www.mozilla.org/security/announce/2015/mfsa2015-55.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-55.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1154683
- https://bugzilla.mozilla.org/show_bug.cgi?id=1154683
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-2718
The WebChannel.jsm module in Mozilla Firefox before 38.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive webchannel-response data via a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data.
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- http://www.mozilla.org/security/announce/2015/mfsa2015-56.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-56.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1146724
- https://bugzilla.mozilla.org/show_bug.cgi?id=1146724
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-2720
The update implementation in Mozilla Firefox before 38.0 on Windows does not ensure that the pathname for updater.exe corresponds to the application directory, which might allow local users to gain privileges via a Trojan horse file.
- http://www.mozilla.org/security/announce/2015/mfsa2015-58.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-58.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- https://bugzilla.mozilla.org/show_bug.cgi?id=1127481
- https://bugzilla.mozilla.org/show_bug.cgi?id=1127481
Modified: 2024-11-21
CVE-2015-4496
Multiple integer overflows in libstagefright in Mozilla Firefox before 38.0 allow remote attackers to execute arbitrary code via crafted sample metadata in an MPEG-4 video file, a related issue to CVE-2015-1538.
- http://www.mozilla.org/security/announce/2015/mfsa2015-93.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-93.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1149605
- https://bugzilla.mozilla.org/show_bug.cgi?id=1149605
- https://hg.mozilla.org/mozilla-central/rev/87277085561a
- https://hg.mozilla.org/mozilla-central/rev/87277085561a