Mozilla Firefox up to 40.0.2 nsIPresShell Use-After-Free buffer overflow : 8/28/2015 10:58:01 AM
Communicate with co-workers in real time. Used by Netflix, Dropbox & Salesforce. $0/unlimited users. Get started >> From our sponsors |
| Vulnerability Advisories |
| Vulnerabilities of scip VulDB |
Mozilla Firefox up to 40.0.2 nsIPresShell Use-After-Free buffer overflow
8/26/2015 7:00:00 PM
General
scipID: 77470
Affected: Mozilla Firefox up to 40.0.2
Published: 08/27/2015 (Ucha Gobejishvili)
Risk: critical
Created: 08/28/2015
Entry: 76% complete
Summary
A vulnerability was found in Mozilla Firefox up to 40.0.2. It has been declared as critical. This vulnerability affects an unknown function of the component nsIPresShell. The manipulation with an unknown input leads to a buffer overflow vulnerability (use-after-free). As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was published 08/27/2015 by Ucha Gobejishvili as MFSA 2015-94 as confirmed security advisory (Website). The advisory is shared for download at mozilla.org. This vulnerability was named CVE-2015-4497. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. The technical details are unknown and an exploit is not available.
Upgrading to version 40.0.3 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability. The vulnerability is also documented in the databases at X-Force (105897) and SecurityTracker (ID 1033397).CVSS
Base Score: 6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P) [?]
Temp Score: 5.0 (CVSS2#E:U/RL:OF/RC:C) [?]
CPE
Exploiting
Class: Buffer overflow
Local: No
Remote: Yes
Availability: No
Status: Unproven
Countermeasures
Recommended: Upgrade
Status: Official fix
Reaction Time: 0 days since reported
0-Day Time: 0 days since found
Exposure Time: 0 days since known
Upgrade: Firefox 40.0.3
Timeline
08/27/2015 | Advisory disclosed
08/27/2015 | Countermeasure disclosed
08/27/2015 | SecurityTracker entry created
08/28/2015 | VulDB entry created
08/28/2015 | VulDB entry updated
Sources
Advisory: MFSA 2015-94
Researcher: Ucha Gobejishvili
Status: Confirmed
CVE: CVE-2015-4497 (mitre.org) (nvd.nist.org) (cvedetails.com)
X-Force: 105897 – Mozilla Firefox CanvasRenderingContext2D code execution
SecurityTracker: 1033397 – Mozilla Firefox Use-After-Free in nsIPresShell Lets Remote Users Execute Arbitrary Code
You are receiving this email because you subscribed to this feed at feedmyinbox.com
If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions