690
VMScore

CVE-2016-1960

Published: 13/03/2016 Updated: 27/12/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 690
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox prior to 45.0 and Firefox ESR 38.x prior to 38.7 allows remote malicious users to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.

Vulnerable Product Search on Vulmon Subscribe to Product

oracle linux 5.0

oracle linux 6

oracle linux 7

mozilla firefox esr 38.3.0

mozilla firefox esr 38.2.1

mozilla firefox esr 38.2.0

mozilla thunderbird

mozilla firefox esr 38.6.0

mozilla firefox esr 38.5.1

mozilla firefox esr 38.0.5

mozilla firefox esr 38.0.1

mozilla firefox esr 38.5.0

mozilla firefox esr 38.4.0

mozilla firefox esr 38.0

mozilla firefox

mozilla firefox esr 38.6.1

mozilla firefox esr 38.1.1

mozilla firefox esr 38.1.0

opensuse opensuse 13.2

opensuse opensuse 13.1

suse linux enterprise 12.0

opensuse leap 42.1

Vendor Advisories

Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail client: Multiple memory safety errors, integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code or denial of service For the oldstable distribution (wheezy), these problems have been fixed in ...
Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, buffer overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, denial of service, address bar spoofing and overwriting local files For the oldstable distribution ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
USN-2917-1 introduced several regressions in Firefox ...
Several security issues were fixed in Thunderbird ...
USN-2917-1 introduced several regressions in Firefox ...
Mozilla Foundation Security Advisory 2016-23 Use-after-free in HTML5 string parser Announced March 8, 2016 Reporter ca0nguyen Impact Critical Products Firefox, Firefox ESR, Thunderbird Fixed in ...

Exploits

<!DOCTYPE HTML> <!-- FULL ASLR AND DEP BYPASS USING ASMJS JIT SPRAY (CVE-2017-5375) *PoC* Exploit against Firefox 4402 (CVE-2016-1960) ASMJS float constant pool JIT-Spray special shown at OffensiveCon 2018 Tested on: Firefox 4402 32-bit - Windows 10 1709 ftpmozillaorg/pub/firefox/releases/4402/w ...
<!doctype html> <html> <head> <meta http-equiv="cache-control" content="no-cache" charset="utf-8" /> <title>CVE-2016-1960</title> <script> /* * Exploit Title: Mozilla Firefox < 450 nsHtml5TreeBuilder Array Indexing Vulnerability (EMET 552 bypass) * Author: Hans Jerry Illikainen (exploit), ca0nguyen ( ...
Mozilla Firefox versions prior to 45 nsHtml5TreeBuilder use-after-free exploit with EMET 552 bypass ...
Firefox version 4402 ASMJS JIT-Spray remote code execution exploit ...

References

NVD-CWE-Otherhttps://bugzilla.mozilla.org/show_bug.cgi?id=1246014http://www.mozilla.org/security/announce/2016/mfsa2016-23.htmlhttp://zerodayinitiative.com/advisories/ZDI-16-198/http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlhttps://security.gentoo.org/glsa/201605-06http://www.ubuntu.com/usn/USN-2934-1http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.htmlhttp://www.debian.org/security/2016/dsa-3510http://www.ubuntu.com/usn/USN-2917-2http://www.ubuntu.com/usn/USN-2917-1http://www.securitytracker.com/id/1035215http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.htmlhttp://www.debian.org/security/2016/dsa-3520http://www.ubuntu.com/usn/USN-2917-3https://www.exploit-db.com/exploits/42484/https://www.exploit-db.com/exploits/44294/https://nvd.nist.govhttps://www.debian.org/security/./dsa-3520https://usn.ubuntu.com/2917-1/https://www.exploit-db.com/exploits/44294/