Vulnerability Details : CVE-2016-9066
Potential exploit
A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
Vulnerability category: Overflow
Products affected by CVE-2016-9066
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-9066
49.61%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-9066
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-9066
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-9066
-
https://www.mozilla.org/security/advisories/mfsa2016-93/
Security vulnerabilities fixed in Thunderbird 45.5 — MozillaVendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-2780.html
RHSA-2016:2780 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.gentoo.org/glsa/201701-15
Mozilla Firefox, Thunderbird: Multiple vulnerabilities (GLSA 201701-15) — Gentoo securityThird Party Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1299686
1299686 - (CVE-2016-9066) Integer overflow leading to a buffer overflow in nsScriptLoadHandlerIssue Tracking;Vendor Advisory
-
https://www.debian.org/security/2016/dsa-3730
Debian -- Security Information -- DSA-3730-1 icedoveThird Party Advisory
-
http://www.securitytracker.com/id/1037298
Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code, Bypass Security Restrictions, Spoof URLs, Modify Files, and Obtain Potentially Sensitive Information - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/94336
Mozilla Firefox Multiple Security VulnerabilitiesThird Party Advisory;VDB Entry
-
https://www.mozilla.org/security/advisories/mfsa2016-90/
Security vulnerabilities fixed in Firefox ESR 45.5 — MozillaVendor Advisory
-
https://www.mozilla.org/security/advisories/mfsa2016-89/
Security vulnerabilities fixed in Firefox 50 — MozillaVendor Advisory
Jump to