Vulnerability Details : CVE-2016-1935
Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.
Vulnerability category: OverflowExecute code
Products affected by CVE-2016-1935
- cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-1935
0.95%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1935
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2016-1935
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-1935
-
http://www.mozilla.org/security/announce/2016/mfsa2016-03.html
Buffer overflow in WebGL after out of memory allocation — MozillaVendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
[security-announce] openSUSE-SU-2016:0306-1: important: Security updateThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html
openSUSE-SU-2016:0492-1: moderate: Security update for MozillaThunderbir
-
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
[security-announce] openSUSE-SU-2016:0309-1: important: Security updateThird Party Advisory
-
http://www.securityfocus.com/bid/81952
Mozilla Firefox CVE-2016-1935 Buffer Overflow Vulnerability
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1220450
Bugzilla.mozilla.org is offlineIssue Tracking
-
http://www.securitytracker.com/id/1034825
Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Spoof the Address Bar, Bypass Security Restrictions, and Deny Service - SecurityTracker
-
http://rhn.redhat.com/errata/RHSA-2016-0258.html
RHSA-2016:0258 - Security Advisory - Red Hat Customer Portal
-
http://www.debian.org/security/2016/dsa-3491
Debian -- Security Information -- DSA-3491-1 icedove
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Oracle Linux Bulletin - January 2016Third Party Advisory
-
https://security.gentoo.org/glsa/201605-06
Mozilla Products: Multiple vulnerabilities (GLSA 201605-06) — Gentoo security
-
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
[security-announce] SUSE-SU-2016:0338-1: important: Security update for
-
http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
openSUSE-SU-2016:0488-1: moderate: Security update for Thunderbird
-
http://www.ubuntu.com/usn/USN-2880-2
USN-2880-2: Firefox regression | Ubuntu security notices
-
http://rhn.redhat.com/errata/RHSA-2016-0071.html
RHSA-2016:0071 - Security Advisory - Red Hat Customer Portal
-
http://www.ubuntu.com/usn/USN-2880-1
USN-2880-1: Firefox vulnerabilities | Ubuntu security notices
-
http://www.ubuntu.com/usn/USN-2904-1
USN-2904-1: Thunderbird vulnerabilities | Ubuntu security notices
-
http://www.debian.org/security/2016/dsa-3457
Debian -- Security Information -- DSA-3457-1 iceweasel
-
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html
[security-announce] openSUSE-SU-2016:0310-1: important: Security updateThird Party Advisory
Jump to