10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.963 High
EPSS
Percentile
99.5%
The specific version of Firefox that the system is running is reportedly affected by the following vulnerabilities:
Mozilla Firefox contains a flaw in the ValueNumberer::fixupOSROnlyLoop() function in jit/ValueNumbering.cpp that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1952)
Mozilla Firefox contains a flaw in the Downscaler::BeginFrame() function in image/Downscaler.cpp that is triggered when failing to compute filters for image downscaling. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1952)
Mozilla Firefox contains a flaw that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1952)
Mozilla Firefox contains a flaw in the JSScript::maybeSweepTypes() function in vm/TypeInference.cpp that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1952)
Mozilla Firefox contains a flaw that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1952)
Mozilla Firefox contains a flaw in the DispatchEvents() function in layout/style/nsAnimationManager.h and layout/style/nsTransitionManager.h that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1952)
Mozilla Firefox contains a flaw in dom/base/Console.cpp that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1952)
Mozilla Firefox contains a flaw in the PeerConnectionMedia::SelfDestruct_m() function in media/webrtc/signaling/src/peerconnection/PeerConnectionMedia.cpp that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1952)
Mozilla Firefox contains a flaw that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1952)
Mozilla Firefox contains a flaw in the nsICODecoder::ReadDirEntry() function in image/decoders/nsICODecoder.cpp that is triggered when rendering ICO sub-images. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw in the nsIDNService::IDNA2008ToUnicode() function in netwerk/dns/nsIDNService.cpp that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw that is triggered as user-supplied input is not properly validated when handling image decoding. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw in the DiscardTransferables() function in vm/StructuredClone.cpp that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw in the Assembler::GetCF32Target() function in jit/arm/Assembler-arm.cpp that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw in the GetPcScript() function in jit/JitFrames.cpp that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw in the JSFunction::isDerivedClassConstructor() function in js/src/jsfun.cpp that is triggered when handling lazy self-hosted functions. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw in js/src/jit/Lowering.cpp that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw in the EventListenerManager::HandleEventInternal() function in dom/events/EventListenerManager.cpp. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw in layout/base/nsRefreshDriver.cpp that is triggered when handling transition events. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw in dom/media/systemservices/CamerasChild.cpp that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
libvpx contains a flaw in the vp8_mb_init_dequantizer() function in vp8/decoder/decodeframe.c that is triggered as user-supplied input is not properly validated. With specially crafted media content, a context-dependent attacker can corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
libvpx contains a flaw in the vp8_loop_filter_frame_init() function in media/libvpx/vp8/common/loopfilter.c that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw in dom/xslt/xslt/txMozillaTextOutput.cpp that is triggered as user-supplied input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw in dom/gamepad/windows/WindowsGamepad.cpp that is triggered when handling WindowsGamepadService shutdown. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1953)
Mozilla Firefox contains a flaw in the nsCSPContext::SendReports() function in dom/security/nsCSPContext.cpp that is triggered during the handling of Content Security Policy (CSP) violation reports. This may allow a context-dependent attacker to overwrite arbitrary files on a user’s machine and potentially gain elevated privileges. (CVE-2016-1954)
Mozilla Firefox contains a flaw in dom/security/nsCSPContext.cpp that is due to Content Security Policy (CSP) violation reports containing full path information for cross-origin iframe navigations in violation of the CSP specification. This may allow a context-dependent attacker to gain unauthorized access to sensitive information. (CVE-2016-1955)
Mozilla Firefox contains a flaw in gfx/gl/GLContext.cpp when using Intel Video cards that is triggered when performing WebGL operations that require a large amount buffer to be allocated from video memory. This may allow a context-dependent to cause a consumption of memory resources that will persist until the system has been restarted. (CVE-2016-1956)
Google Stagefright contains a flaw that is triggered during the handling of array destruction during MPEG4 video file processing. This may allow a context-dependent attacker to cause a memory leak, with unspecified consequences.
(CVE-2016-1957)
Mozilla Firefox contains an unspecified flaw that may allow a context-dependent attacker to spoof the user’s address bar. No further details have been provided. (CVE-2016-1958)
Mozilla Firefox contains a flaw in Service Worker Manager that is triggered when handling the Clients API. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1959)
Mozilla Firefox contains a use-after-free error in the HTML5 string parser. The issue is triggered when parsing a set of table-related tags in a foreign fragment context such as SVG. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code. (CVE-2016-1960)
Mozilla Firefox contains a use-after-free error in the nsHTMLDocument::SetBody() function in dom/html/nsHTMLDocument.cpp. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code. (CVE-2016-1961)
Mozilla Firefox contains a use-after-free error in netwerk/sctp/datachannel/DataChannel.cpp when using multiple WebRTC data channel connections and freeing a data channel connection from within a call. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code. (CVE-2016-1962)
Mozilla Firefox contains a flaw in the FileReader::DoReadData() function in dom/base/FileReader.cpp. The issue is triggered as user-supplied input is not properly validated when handling modifications to local files that occur while they are being read with the FileReader API. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1963)
Mozilla Firefox contains a use-after-free error in the txAttribute::execute() function in dom/xslt/xslt/txInstructions.cpp that is triggered when handling XML transformation operations. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code. (CVE-2016-1964)
Mozilla Firefox contains a flaw in the nsLocation::SetProtocol() function in dom/base/nsLocation.cpp that is triggered when handling history navigation in combination with the location protocol property. This may allow a context-dependent attacker to spoof the contents of the address bar. (CVE-2016-1965)
Mozilla Firefox contains a flaw that is triggered when handling history navigation in a restored browser session. This may potentially allow a context-dependent attacker to gain unauthorized access to cross-origin URL information. (CVE-2016-1967)
Mozilla Firefox contains a pointer underflow condition in the Brotli library. The issue is triggered as user-supplied input is not properly validated when the library is performing decompression. This may allow a context-dependent attacker to cause a buffer overflow, potentially allowing the execution of arbitrary code. (CVE-2016-1968)
Mozilla Firefox contains a use-after-free flaw in the Netscape Plugin Application Programming Interface (NPAPI) plugin within the nsNPObjWrapper::GetNewOrUsed() function in dom/plugins/base/nsJSNPRuntime.cpp. The issue is triggered when handling malicious scripted web content in concert with the plugin. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code. (CVE-2016-1966)
Mozilla Firefox contains an integer underflow condition in the srtp_unprotect() function in netwerk/srtp/src/srtp/srtp.c that is triggered when handling SRTP packet lenghts. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1970)
Mozilla Firefox contains a flaw in the I420VideoFrame::CreateFrame() function in WebRTC. The issue is triggered as user-supplied input is not properly validated due to a missing status check. This may potentially allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1971)
Mozilla Firefox contains a race condition in dom/media/systemservices/CamerasChild.h. The issue is triggered as user-supplied input is not properly validated when handling block-level statistics. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-1975)
Mozilla Firefox contains a use-after-free flaw in DesktopDisplayDevice::operator= in media/webrtc/trunk/webrtc/modules/desktop_capture/desktop_device_info.cc. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code. (CVE-2016-1976)
libvpx contains a use-after-free error in vpx_ports/vpx_once.h related to a race condition. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code.
(CVE-2016-1972)
Mozilla Firefox contains a use-after-free error that is triggered by a race condition in GetStaticInstance in WebRTC. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code. (CVE-2016-1973)
Mozilla Firefox contains a flaw in the nsScannerString::AppendUnicodeTo() function in parser/htmlparser/nsScannerString.cpp. The issue is triggered when the program fails to allocate memory during handling of unicode strings. This may allow a context-dependent attacker to potentially execute arbitrary code. (CVE-2016-1974)
Mozilla Network Security Services (NSS) contains a use-after-free error in the PK11_ImportDERPrivateKeyInfoAndReturnKey() function. The issue is triggered when handling DER encoded keys. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code.
(CVE-2016-1979)
Graphite/Libgraphite contains a flaw in the Machine::Code::decoder::analysis::set_ref() function. The issue is triggered as user-supplied input is not properly validated. With a specially crafted font, a context-dependent attacker can corrupt memory to cause a denial of service in a process linked against the library or potentially execute arbitrary code. (CVE-2016-1977)
Graphite/Libgraphite contains a flaw in the GetTableInfo() function in TtfUtil.cpp related to the use of uninitialized memory when handling a specially crafted font. This may allow a context-dependent attacker to have an unspecified impact. (CVE-2016-2790)
Graphite/Libgraphite contains an out-of-bounds read flaw in the GlyphCache::glyph() function that is triggered when handling maliciously crafted fonts. This may allow a context-dependent attacker to crash a process linked against the library or potentially disclose memory contents. (CVE-2016-2791)
Graphite/Libgraphite contains an out-of-bounds read flaw in the getAttr() function in Slot.cpp that is triggered when handling maliciously crafted fonts. This may allow a context-dependent attacker to crash a process linked against the library or potentially disclose memory contents. (CVE-2016-2792)
Graphite/Libgraphite contains an out-of-bounds read flaw in CachedCmap.cpp that is triggered when handling maliciously crafted fonts. This may allow a context-dependent attacker to crash a process linked against the library or potentially disclose memory contents. (CVE-2016-2793)
Graphite/Libgraphite contains an out-of-bounds read flaw in the CmapSubtable12NextCodepoint() function in TtfUtil.cpp that is triggered when handling maliciously crafted fonts. This may allow a context-dependent attacker to crash a process linked against the library or potentially disclose memory contents. (CVE-2016-2794)
Graphite/Libgraphite contains a flaw in the FileFace::get_table_fn() function related to the use of uninitialized memory when handling a specially crafted font. This may allow a context-dependent attacker to have an unspecified impact. (CVE-2016-2795)
Graphite/Libgraphite contains an out-of-bounds write flaw in the vm::Machine::Code::Code() function that is triggered when handling maliciously crafted fonts. This may allow a context-dependent attacker to potentially execute arbitrary code. (CVE-2016-2796)
Graphite/Libgraphite contains an out-of-bounds read flaw in the CmapSubtable12Lookup() function in TtfUtil.cpp that is triggered when handling maliciously crafted fonts. This may allow a context-dependent attacker to crash a process linked against the library or potentially disclose memory contents. (CVE-2016-2797)
Graphite/Libgraphite contains an out-of-bounds read flaw in the GlyphCache::Loader::Loader() function that is triggered when handling maliciously crafted fonts. This may allow a context-dependent attacker to crash a process linked against the library or potentially disclose memory contents. (CVE-2016-2798)
Graphite/Libgraphite contains an out-of-bounds write flaw in the setAttr() function in Slot.cpp that is triggered when handling maliciously crafted fonts. This may allow a context-dependent attacker to potentially execute arbitrary code. (CVE-2016-2799)
Graphite/Libgraphite contains an out-of-bounds read flaw in the getAttr() function in Slot.cpp that is triggered when handling maliciously crafted fonts. This may allow a context-dependent attacker to crash a process linked against the library or potentially disclose memory contents. (CVE-2016-2800)
Graphite/Libgraphite contains an out-of-bounds read flaw in the CmapSubtable12Lookup() function in TtfUtil.cpp that is triggered when handling maliciously crafted fonts. This may allow a context-dependent attacker to crash a process linked against the library or potentially disclose memory contents. (CVE-2016-2801)
Graphite/Libgraphite contains an out-of-bounds read flaw in the CmapSubtable4NextCodepoint() function in TtfUtil.cpp that is triggered when handling maliciously crafted fonts. This may allow a context-dependent attacker to crash a process linked against the library or potentially disclose memory contents. (CVE-2016-2802)
Graphite/Libgraphite contains an out-of-bounds write flaw in the setAttr() function that is triggered when handling maliciously crafted fonts. This may allow a context-dependent attacker to potentially execute arbitrary code. (CVE-2016-1969)
Binary data 802023.prm
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1953
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1955
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1956
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1959
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1963
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1967
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1968
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1969
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1970
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1971
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1972
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1973
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1975
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1977
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2790
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2792
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2794
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2797
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2798
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2800
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2802
lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html
lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html
lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html
pivotal.io/security/usn-2927-1
seclists.org/bugtraq/2016/Apr/153
seclists.org/bugtraq/2016/Mar/145
seclists.org/bugtraq/2016/Mar/72
seclists.org/bugtraq/2016/Mar/97
seclists.org/bugtraq/2016/May/63
www-01.ibm.com/support/docview.wss?uid=isg3T1023778
www-01.ibm.com/support/docview.wss?uid=ssg1S1005811
www-01.ibm.com/support/docview.wss?uid=swg21982583
www.ubuntu.com/usn/usn-2917-1/
www.ubuntu.com/usn/usn-2917-2/
www.ubuntu.com/usn/usn-2917-3/
www.ubuntu.com/usn/usn-2927-1/
www.ubuntu.com/usn/usn-2934-1/
www.ubuntu.com/usn/usn-2973-1/
www.zerodayinitiative.com/advisories/ZDI-16-198/
www.zerodayinitiative.com/advisories/ZDI-16-199/
bto.bluecoat.com/security-advisory/sa124
bugs.debian.org/cgi-bin/bugreport.cgi?bug=817233
bugzilla.mozilla.org/show_bug.cgi?id=1123661
bugzilla.mozilla.org/show_bug.cgi?id=1176340
bugzilla.mozilla.org/show_bug.cgi?id=1185033
bugzilla.mozilla.org/show_bug.cgi?id=1199171
bugzilla.mozilla.org/show_bug.cgi?id=1199923
bugzilla.mozilla.org/show_bug.cgi?id=1205163
bugzilla.mozilla.org/show_bug.cgi?id=1207958
bugzilla.mozilla.org/show_bug.cgi?id=1208946
bugzilla.mozilla.org/show_bug.cgi?id=1216837
bugzilla.mozilla.org/show_bug.cgi?id=1217663
bugzilla.mozilla.org/show_bug.cgi?id=1218124
bugzilla.mozilla.org/show_bug.cgi?id=1219339
bugzilla.mozilla.org/show_bug.cgi?id=1221872
bugzilla.mozilla.org/show_bug.cgi?id=1224361
bugzilla.mozilla.org/show_bug.cgi?id=1224363
bugzilla.mozilla.org/show_bug.cgi?id=1224369
bugzilla.mozilla.org/show_bug.cgi?id=1224979
bugzilla.mozilla.org/show_bug.cgi?id=1225618
bugzilla.mozilla.org/show_bug.cgi?id=1227052
bugzilla.mozilla.org/show_bug.cgi?id=1228103
bugzilla.mozilla.org/show_bug.cgi?id=1228754
bugzilla.mozilla.org/show_bug.cgi?id=1230768
bugzilla.mozilla.org/show_bug.cgi?id=1234425
bugzilla.mozilla.org/show_bug.cgi?id=1234578
bugzilla.mozilla.org/show_bug.cgi?id=1234949
bugzilla.mozilla.org/show_bug.cgi?id=1236519
bugzilla.mozilla.org/show_bug.cgi?id=1238440
bugzilla.mozilla.org/show_bug.cgi?id=1238558
bugzilla.mozilla.org/show_bug.cgi?id=1238935
bugzilla.mozilla.org/show_bug.cgi?id=1240760
bugzilla.mozilla.org/show_bug.cgi?id=1241217
bugzilla.mozilla.org/show_bug.cgi?id=1241731
bugzilla.mozilla.org/show_bug.cgi?id=1242279
bugzilla.mozilla.org/show_bug.cgi?id=1242322
bugzilla.mozilla.org/show_bug.cgi?id=1243178
bugzilla.mozilla.org/show_bug.cgi?id=1243335
bugzilla.mozilla.org/show_bug.cgi?id=1243464
bugzilla.mozilla.org/show_bug.cgi?id=1243473
bugzilla.mozilla.org/show_bug.cgi?id=1243482
bugzilla.mozilla.org/show_bug.cgi?id=1243513
bugzilla.mozilla.org/show_bug.cgi?id=1243526
bugzilla.mozilla.org/show_bug.cgi?id=1243555
bugzilla.mozilla.org/show_bug.cgi?id=1243583
bugzilla.mozilla.org/show_bug.cgi?id=1243597
bugzilla.mozilla.org/show_bug.cgi?id=1243816
bugzilla.mozilla.org/show_bug.cgi?id=1243823
bugzilla.mozilla.org/show_bug.cgi?id=1244250
bugzilla.mozilla.org/show_bug.cgi?id=1244995
bugzilla.mozilla.org/show_bug.cgi?id=1245264
bugzilla.mozilla.org/show_bug.cgi?id=1245866
bugzilla.mozilla.org/show_bug.cgi?id=1246014
bugzilla.mozilla.org/show_bug.cgi?id=1246054
bugzilla.mozilla.org/show_bug.cgi?id=1246742
bugzilla.mozilla.org/show_bug.cgi?id=1246956
bugzilla.mozilla.org/show_bug.cgi?id=1247236
bugzilla.mozilla.org/show_bug.cgi?id=1248794
bugzilla.mozilla.org/show_bug.cgi?id=1248804
bugzilla.mozilla.org/show_bug.cgi?id=1248805
bugzilla.mozilla.org/show_bug.cgi?id=1248876
bugzilla.mozilla.org/show_bug.cgi?id=1249081
bugzilla.mozilla.org/show_bug.cgi?id=1249338
bugzilla.mozilla.org/show_bug.cgi?id=1249377
bugzilla.mozilla.org/show_bug.cgi?id=1249685
bugzilla.mozilla.org/show_bug.cgi?id=1249920
download.novell.com/Download?buildid=MVAFl0oMTck~
download.novell.com/Download?buildid=W46YTfqEGiQ~
packetstormsecurity.com/files/136152/Debian-Security-Advisory-3510-1.html
packetstormsecurity.com/files/136196/Debian-Security-Advisory-3515-1.html
packetstormsecurity.com/files/136201/Ubuntu-Security-Notice-USN-2927-1.html
packetstormsecurity.com/files/136272/Red-Hat-Security-Advisory-2016-0460-01.html
support.f5.com/kb/en-us/solutions/public/k/20/sol20145801.html
www-304.ibm.com/support/docview.wss?uid=ssg1S1005812
www.debian.org/security/2016/dsa-3510
www.debian.org/security/2016/dsa-3515
www.debian.org/security/2016/dsa-3520
www.debian.org/security/2016/dsa-3559
www.debian.org/security/2016/dsa-3576
www.mozilla.org/
www.mozilla.org/en-US/security/advisories/mfsa2016-16/
www.mozilla.org/en-US/security/advisories/mfsa2016-17/
www.mozilla.org/en-US/security/advisories/mfsa2016-18/
www.mozilla.org/en-US/security/advisories/mfsa2016-19/
www.mozilla.org/en-US/security/advisories/mfsa2016-20/
www.mozilla.org/en-US/security/advisories/mfsa2016-21/
www.mozilla.org/en-US/security/advisories/mfsa2016-22/
www.mozilla.org/en-US/security/advisories/mfsa2016-23/
www.mozilla.org/en-US/security/advisories/mfsa2016-24/
www.mozilla.org/en-US/security/advisories/mfsa2016-25/
www.mozilla.org/en-US/security/advisories/mfsa2016-26/
www.mozilla.org/en-US/security/advisories/mfsa2016-27/
www.mozilla.org/en-US/security/advisories/mfsa2016-28/
www.mozilla.org/en-US/security/advisories/mfsa2016-29/
www.mozilla.org/en-US/security/advisories/mfsa2016-30/
www.mozilla.org/en-US/security/advisories/mfsa2016-31/
www.mozilla.org/en-US/security/advisories/mfsa2016-32/
www.mozilla.org/en-US/security/advisories/mfsa2016-33/
www.mozilla.org/en-US/security/advisories/mfsa2016-34/
www.mozilla.org/en-US/security/advisories/mfsa2016-36/
www.mozilla.org/en-US/security/advisories/mfsa2016-37/
www.mozilla.org/en-US/security/advisories/mfsa2016-38/
www.mozilla.org/en-US/security/advisories/mfsa2016-39/
www.suse.com/support/update/announcement/2016/suse-su-20160727-1.html
www.suse.com/support/update/announcement/2016/suse-su-20160777-1.html
www.suse.com/support/update/announcement/2016/suse-su-20160820-1.html
www.suse.com/support/update/announcement/2016/suse-su-20160909-1.html
www.suse.com/support/update/announcement/2016/suse-su-20161258-1.html
www.suse.com/support/update/announcement/2016/suse-su-20161342-1.html
www.suse.com/support/update/announcement/2016/suse-su-20161352-1.html
www.suse.com/support/update/announcement/2016/suse-su-20161374-1.html
www.xerox.com/download/security/security-bulletin/287fc-53b3b113cc7a1/cert_XRX16-015_v1.0_FFPS2.1_Standalone_Aug10_2016-1.pdf
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.963 High
EPSS
Percentile
99.5%