CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
93.4%
Integer overflow in the MPEG4Extractor::readMetaData function in MPEG4Extractor.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 on 64-bit platforms allows remote attackers to execute arbitrary code via a crafted MP4 video file that triggers a buffer overflow.
Vendor | Product | Version | CPE |
---|---|---|---|
opensuse | leap | 42.1 | cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* |
opensuse | opensuse | 13.1 | cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* |
opensuse | opensuse | 13.2 | cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* |
fedoraproject | fedora | 22 | cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* |
fedoraproject | fedora | 23 | cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* |
mozilla | firefox_esr | 38.0 | cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:x64:* |
mozilla | firefox_esr | 38.0.1 | cpe:2.3:a:mozilla:firefox_esr:38.0.1:*:*:*:*:*:x64:* |
mozilla | firefox_esr | 38.0.5 | cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:x64:* |
mozilla | firefox_esr | 38.1.0 | cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:x64:* |
mozilla | firefox_esr | 38.1.1 | cpe:2.3:a:mozilla:firefox_esr:38.1.1:*:*:*:*:*:x64:* |
lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
rhn.redhat.com/errata/RHSA-2015-2657.html
www.debian.org/security/2015/dsa-3422
www.debian.org/security/2016/dsa-3432
www.mozilla.org/security/announce/2015/mfsa2015-146.html
www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
www.securityfocus.com/bid/79279
www.securitytracker.com/id/1034426
www.ubuntu.com/usn/USN-2833-1
www.ubuntu.com/usn/USN-2859-1
bugzilla.mozilla.org/show_bug.cgi?id=1206211
security.gentoo.org/glsa/201512-10