CVE-2016-1930

Published on: 01/31/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:05 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Firefox from Mozilla contain the following vulnerability:

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

  • CVE-2016-1930 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 10 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
[security-announce] openSUSE-SU-2016:0306-1: important: Security update Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0306
Miscellaneous memory safety hazards (rv:44.0 / rv:38.6) — Mozilla Vendor Advisory
www.mozilla.org
text/html
URL Logo CONFIRM www.mozilla.org/security/announce/2016/mfsa2016-01.html
1224200 - Assertion failure: mCurrentOutLine < mTargetSize.height (Past end of output), at c:/Users/mozilla/debug-builds/mozilla-central/image/Downscaler.cpp:198 Issue Tracking
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1224200
1230668 - Heap-use-after-free [@ nsStyleContext::~nsStyleContext] Issue Tracking
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1230668
openSUSE-SU-2016:0488-1: moderate: Security update for Thunderbird lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0488
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:0071
1233152 - Crash [@ js::CompartmentChecker::fail] or Crash [@ compartment] Issue Tracking
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1233152
USN-2880-2: Firefox regression | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2880-2
[security-announce] SUSE-SU-2016:0338-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:0338
USN-2904-1: Thunderbird vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2904-1
Mozilla Products: Multiple vulnerabilities (GLSA 201605-06) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201605-06
[security-announce] openSUSE-SU-2016:0309-1: important: Security update Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0309
openSUSE-SU-2016:0492-1: moderate: Security update for MozillaThunderbir lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0492
1234571 - UAF in MutexAutoLock::MutexAutoLock on frame-encoded callback when closing active webrtc call Issue Tracking
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1234571
Mozilla Firefox MFSA 2016-01 Multiple Memory Corruption Vulnerabilities cve.report (archive)
text/html
URL Logo BID 81953
Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Spoof the Address Bar, Bypass Security Restrictions, and Deny Service - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1034825
1223670 - "Assertion failure: cycleStackMarker == ps->mCycleMarker" Issue Tracking
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1223670
1230483 - crash in mozilla::MediaDecoder::NotifySuspendedStatusChanged Issue Tracking
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1230483
Oracle Linux Bulletin - January 2016 Third Party Advisory
www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Debian -- Security Information -- DSA-3457-1 iceweasel www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3457
1233925 - Crash [@ JSObject::allocKindForTenure] with rest parameter Issue Tracking
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1233925
1233346 - Potential buffer overrun in Windows ICE interface name code Issue Tracking
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1233346
1234280 - Assertion failure: aIndex < mLength, at ../../dist/include/mozilla/Vector.h:451 with OOM Issue Tracking
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1234280
[security-announce] openSUSE-SU-2016:0310-1: important: Security update Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0310
USN-2880-1: Firefox vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2880-1
1221385 - Crash [@ js::jit::ExecutableAllocator::releasePoolPages] or Assertion failure: m_refCount == 1, at jit/ExecutableAllocator.h or Assertion failure: jrt_->mutatingBackedgeList_, at jit/JitCompartment.h Issue Tracking
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1221385
1230686 - Heap-use-after-free [@ nsLayoutUtils::SurfaceFromElement] with drawImage, many canvas elements Issue Tracking
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1230686
1230639 - "ASSERTION: All class values should be StoresOwnData and parsedvia Element::BeforeSetAttr, so available here" Issue Tracking
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1230639
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:0258
Debian -- Security Information -- DSA-3491-1 icedove www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3491

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationMozillaFirefoxAllAllAllAll
ApplicationMozillaFirefox Esr38.0AllAllAll
ApplicationMozillaFirefox Esr38.1.0AllAllAll
ApplicationMozillaFirefox Esr38.2.0AllAllAll
ApplicationMozillaFirefox Esr38.3.0AllAllAll
ApplicationMozillaFirefox Esr38.4.0AllAllAll
ApplicationMozillaFirefox Esr38.5.0AllAllAll
ApplicationMozillaFirefox Esr38.0AllAllAll
ApplicationMozillaFirefox Esr38.1.0AllAllAll
ApplicationMozillaFirefox Esr38.2.0AllAllAll
ApplicationMozillaFirefox Esr38.3.0AllAllAll
ApplicationMozillaFirefox Esr38.4.0AllAllAll
ApplicationMozillaFirefox Esr38.5.0AllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseOpensuse13.1AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
Operating
System
OpensuseOpensuse13.1AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
Operating
System
OracleLinux5.0AllAllAll
Operating
System
OracleLinux6AllAllAll
Operating
System
OracleLinux7AllAllAll
Operating
System
OracleLinux5.0AllAllAll
Operating
System
OracleLinux6AllAllAll
Operating
System
OracleLinux7AllAllAll
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox_esr:38.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox_esr:38.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox_esr:38.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox_esr:38.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*: