[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-4503Date: (C)2015-09-28   (M)2024-03-27


The TCP Socket API implementation in Mozilla Firefox before 41.0 mishandles array boundaries that were established with a navigator.mozTCPSocket.open method call and send method calls, which allows remote TCP servers to obtain sensitive information from process memory by reading packet data, as demonstrated by availability of this API in a Firefox OS application.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
SECTRACK-1033640
BID-76815
http://www.mozilla.org/security/announce/2015/mfsa2015-97.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
https://bugzilla.mozilla.org/show_bug.cgi?id=994337
openSUSE-SU-2015:1658
openSUSE-SU-2015:1681

CPE    1
cpe:/a:mozilla:firefox
CWE    1
CWE-200
OVAL    4
oval:org.secpod.oval:def:27014
oval:org.secpod.oval:def:27015
oval:org.secpod.oval:def:27058
oval:org.secpod.oval:def:27057
...

© SecPod Technologies