7.5
CVSSv2

CVE-2015-4513

Published: 05/11/2015 Updated: 07/12/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox prior to 42.0 and Firefox ESR 38.x prior to 38.4 allow remote malicious users to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

mozilla firefox esr 38.1.1

mozilla firefox esr 38.2.0

mozilla firefox esr 38.0

mozilla firefox esr 38.0.1

mozilla firefox esr 38.0.5

mozilla firefox esr 38.1.0

mozilla firefox esr 38.2.1

mozilla firefox esr 38.3.0

Vendor Advisories

Synopsis Important: thunderbird security update Type/Severity Security Advisory: Important Topic An updated thunderbird package that fixes multiple security issues is nowavailable for Red Hat Enterprise Linux 5, 6, and 7Red Hat Product Security has rated this update as having Important securityimpact Comm ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Several security issues were fixed in Thunderbird ...
Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail client: Multiple memory safety errors, integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code or denial of service For the oldstable distribution (wheezy), these problems have been fixed in ...
Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code, information disclosure or denial of service For the oldstable distribution (wheezy), these proble ...
Mozilla Foundation Security Advisory 2015-116 Miscellaneous memory safety hazards (rv:420 / rv:384) Announced November 3, 2015 Reporter Mozilla Developers Impact Critical Products Firefox, Firefox ESR, Firefox OS, Thunderb ...
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 420 and Firefox ESR 38x before 384 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors ...

Recent Articles

Firefox 42 ... answer to the ultimate question of life, security bugs and fully private browsing?
The Register • Shaun Nichols in San Francisco • 04 Nov 2015

SSL/TLS library flaws found, anti-analytics missiles deployed

Mozilla has released Firefox 42 and Firefox ESR 38 38.4, which include fixes for worrying security vulnerabilities in the web browser. The November 3 update squashes at least three bugs that can be potentially exploited to achieve remote code execution. Two Mozilla engineers, Tyson Smith and David Keeler, uncovered two flaws (CVE-2015-7181 and CVE-2015-7182) in NSS, a toolkit used by Firefox to encrypt web traffic over SSL/TLS. By exploiting "a use-after-poison and buffer overflow in the ASN.1 d...

References

CWE-119https://bugzilla.mozilla.org/show_bug.cgi?id=1204580https://bugzilla.mozilla.org/show_bug.cgi?id=1213979https://bugzilla.mozilla.org/show_bug.cgi?id=1205707https://bugzilla.mozilla.org/show_bug.cgi?id=1209471http://www.mozilla.org/security/announce/2015/mfsa2015-116.htmlhttps://bugzilla.mozilla.org/show_bug.cgi?id=1107011https://bugzilla.mozilla.org/show_bug.cgi?id=1204669https://bugzilla.mozilla.org/show_bug.cgi?id=1204700https://bugzilla.mozilla.org/show_bug.cgi?id=1206564https://bugzilla.mozilla.org/show_bug.cgi?id=1193038https://bugzilla.mozilla.org/show_bug.cgi?id=1191942https://bugzilla.mozilla.org/show_bug.cgi?id=1208665http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlhttp://www.securityfocus.com/bid/77411http://www.debian.org/security/2015/dsa-3410http://rhn.redhat.com/errata/RHSA-2015-2519.htmlhttp://www.debian.org/security/2015/dsa-3393http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.htmlhttp://www.ubuntu.com/usn/USN-2785-1http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1982.htmlhttp://www.securitytracker.com/id/1034069http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.htmlhttps://security.gentoo.org/glsa/201512-10http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.htmlhttp://www.ubuntu.com/usn/USN-2819-1http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.htmlhttps://access.redhat.com/errata/RHSA-2015:2519https://nvd.nist.govhttps://usn.ubuntu.com/2785-1/https://access.redhat.com/security/cve/cve-2015-4513