[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Arbitrary code execution vulnerability in Mozilla Firefox and Firefox ESR via a crafted web site - MFSA2016-47 (Mac OS X)

ID: oval:org.secpod.oval:def:34240Date: (C)2016-05-03   (M)2023-12-20
Class: PATCHFamily: macos




The host is missing an important security update according to Mozilla advisory, MFSA2016-47. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the JavaScript .watch() method, which can be used to overflow the 32-bit generation count of the underlying HashMap, resulting in a write to an invalid entry. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash).

Platform:
Apple Mac OS 14
Apple Mac OS 13
Apple Mac OS 12
Apple Mac OS 11
Apple Mac OS X 10.15
Apple Mac OS X 10.14
Apple Mac OS X 10.12
Apple Mac OS X 10.13
Apple Mac OS X 10.9
Apple Mac OS X 10.10
Apple Mac OS X 10.11
Apple Mac OS X Server 10.9
Apple Mac OS X Server 10.10
Apple Mac OS X Server 10.11
Product:
Mozilla Firefox
Mozilla Firefox ESR
Reference:
MFSA2016-47
CVE-2016-2808
CVE    1
CVE-2016-2808
CPE    15
cpe:/a:mozilla:firefox_esr
cpe:/a:mozilla:firefox_esr:38.0
cpe:/a:mozilla:firefox_esr:38.1.1
cpe:/a:mozilla:firefox_esr:38.2.0
...

© SecPod Technologies