CVE-2016-1951

Published on: 08/07/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:05 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Certain versions of Netscape Portable Runtime from Mozilla contain the following vulnerability:

Multiple integer overflows in io/prprf.c in Mozilla Netscape Portable Runtime (NSPR) before 4.12 allow remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long string to a PR_*printf function.

  • CVE-2016-1951 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.6 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED LOW LOW HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Netscape Portable Runtime API Lets Remote Users Deny Service - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1036590
nspr: changeset 4662:96381e3aaae27d50ddd877451c0b31d260c59931 hg.mozilla.org
text/xml
URL Logo CONFIRM hg.mozilla.org/projects/nspr/rev/96381e3aaae2
USN-3023-1: Thunderbird vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-3023-1
Mailing List
groups.google.com
text/plain
MLIST [dev-tech-nspr] 20160217 [ANNOUNCE] NSPR 4.12 Release
1174015 - (CVE-2016-1951) Overflow in prprf/GrowStuff can cause memory-safety bug Issue Tracking
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1174015
Mozilla Netscape Portable Runtime CVE-2016-1951 Multiple Integer Overflow Vulnerabilities cve.report (archive)
text/html
URL Logo BID 92385

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationMozillaNetscape Portable RuntimeAllAllAllAll
  • cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*: