7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
0.011 Low
EPSS
Percentile
84.2%
Debian Security Advisory DSA-3716-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
November 16, 2016 https://www.debian.org/security/faq
Package : firefox-esr
CVE ID : CVE-2016-5290 CVE-2016-5291 CVE-2016-5296 CVE-2016-5297
CVE-2016-9064 CVE-2016-9066 CVE-2016-9074
Multiple security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, buffer overflows and other
implementation errors may lead to the execution of arbitrary code or
bypass of the same-origin policy. Also, a man-in-the-middle attack in
the addon update mechanism has been fixed.
For the stable distribution (jessie), these problems have been fixed in
version 45.5.0esr-1~deb8u1.
For the unstable distribution (sid), these problems have been fixed in
version 45.5.0esr-1 and version 50.0-1 of the firefox source package.
We recommend that you upgrade your firefox-esr packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | amd64 | iceowl-extension | < 1:45.5.1-1~deb7u1 | iceowl-extension_1:45.5.1-1~deb7u1_amd64.deb |
Debian | 8 | all | iceweasel-l10n-uz | < 1:45.5.0esr-1~deb8u1 | iceweasel-l10n-uz_1:45.5.0esr-1~deb8u1_all.deb |
Debian | 8 | all | iceowl-l10n-sq | < 1:45.5.1-1~deb8u1 | iceowl-l10n-sq_1:45.5.1-1~deb8u1_all.deb |
Debian | 8 | all | firefox-esr-l10n-en-za | < 45.5.0esr-1~deb8u1 | firefox-esr-l10n-en-za_45.5.0esr-1~deb8u1_all.deb |
Debian | 7 | all | firefox-esr-l10n-or | < 45.5.1esr-1~deb7u1 | firefox-esr-l10n-or_45.5.1esr-1~deb7u1_all.deb |
Debian | 8 | ppc64el | firefox-esr-dbg | < 45.5.0esr-1~deb8u1 | firefox-esr-dbg_45.5.0esr-1~deb8u1_ppc64el.deb |
Debian | 8 | all | icedove-l10n-he | < 1:45.5.1-1~deb8u1 | icedove-l10n-he_1:45.5.1-1~deb8u1_all.deb |
Debian | 8 | all | iceowl-l10n-uk | < 1:45.5.1-1~deb8u1 | iceowl-l10n-uk_1:45.5.1-1~deb8u1_all.deb |
Debian | 8 | all | iceowl-l10n-is | < 1:45.5.1-1~deb8u1 | iceowl-l10n-is_1:45.5.1-1~deb8u1_all.deb |
Debian | 7 | all | icedove-l10n-all | < 1:45.5.1-1~deb7u1 | icedove-l10n-all_1:45.5.1-1~deb7u1_all.deb |
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
0.011 Low
EPSS
Percentile
84.2%