Integer overflow vulnerability in Mozilla Firefox, Firefox ESR or Thunderbird due to an error in argument length checking in JavaScriptID: oval:org.secpod.oval:def:38054 | Date: (C)2016-11-16 (M)2024-03-27 |
Class: VULNERABILITY | Family: windows |
The host is installed with Mozilla Firefox before 50.0, Firefox ESR before 45.5 or Thunderbird 45.x before 45.5 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to handle argument length checking in JavaScript. Successful exploitation allows remote attackers to cause potential integer overflows or other bounds checking issues.
Platform: |
Microsoft Windows Server 2022 |
Microsoft Windows 11 |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2003 |
Microsoft Windows 8 |
Microsoft Windows Server 2008 |
Microsoft Windows Vista |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows 10 |
Product: |
Mozilla Firefox |
Mozilla Firefox ESR |
Mozilla Thunderbird |