8.8
CVSSv3

CVE-2016-1935

Published: 31/01/2016 Updated: 27/12/2019
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the BufferSubData function in Mozilla Firefox prior to 44.0 and Firefox ESR 38.x prior to 38.6 allows remote malicious users to execute arbitrary code via crafted WebGL content.

Vulnerable Product Search on Vulmon Subscribe to Product

opensuse opensuse 13.1

opensuse leap 42.1

opensuse opensuse 13.2

oracle linux 6

oracle linux 5.0

oracle linux 7

mozilla firefox

mozilla firefox esr 38.4.0

mozilla firefox esr 38.5.0

mozilla firefox esr 38.2.0

mozilla firefox esr 38.3.0

mozilla firefox esr 38.0

mozilla firefox esr 38.1.0

Vendor Advisories

USN-2880-1 introduced a regression in Firefox ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Several security issues were fixed in Thunderbird ...
Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail client: Multiple memory safety errors, integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code or denial of service For the oldstable distribution (wheezy), these problems have been fixed in ...
Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors and a buffer overflow may lead to the execution of arbitrary code In addition the bundled NSS crypto library addresses the SLOTH attack on TLS 12 For the oldstable distribution (wheezy), these problems have be ...
Mozilla Foundation Security Advisory 2016-03 Buffer overflow in WebGL after out of memory allocation Announced January 26, 2016 Reporter Aki Helin Impact Critical Products Firefox, Firefox ESR, Thunderbird Fixed in ...
Buffer overflow in the BufferSubData function in Mozilla Firefox before 440 and Firefox ESR 38x before 386 allows remote attackers to execute arbitrary code via crafted WebGL content ...