CVE-2016-2806

Published on: 04/30/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:15 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of Debian Linux from Debian contain the following vulnerability:

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

  • CVE-2016-2806 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 10 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
1231919 - crash in mozilla::a11y::DocAccessible::ValidateARIAOwned bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1231919
1258231 - crash in nsConsoleService::ClearMessagesForWindowID bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1258231
1228882 - "ASSERTION: element already removed from map" or heap-buffer-overflow with , dir=auto bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1228882
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:0695
1254122 - Assertion failure: returnAddr > method_->raw(), at js/src/jit/BaselineJIT.cpp:731 with OOM and TypedObject bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1254122
1238592 - Crash at xul!js::InlineSpaghettiStackIterator::InlineSpaghettiStackIterator+0x00000012) bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1238592
1212328 - Crash [@ js::PrintError] with heap-buffer-overflow involving evalInWorker bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1212328
Mozilla Firefox, Thunderbird: Multiple vulnerabilities (GLSA 201701-15) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201701-15
[security-announce] openSUSE-SU-2016:1211-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1211
openSUSE-SU-2016:1251-1: moderate: Security update to Firefox 46.0 lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1251
USN-2936-2: Oxygen-GTK3 update | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2936-2
1255949 - Crash [@ ??] with weird memory address bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1255949
Access Denied bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1251922
Oracle Linux Bulletin - April 2016 www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
USN-2936-1: Firefox vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2936-1
1242810 - Assertion failure: MIR instruction returned object with unexpected type, at js/src/jit/MacroAssembler.cpp:1445 bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1242810
Debian -- Security Information -- DSA-3601-1 icedove www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3601
1253099 - Assertion failure: p, at js/src/vm/Shape.cpp:1568 with RegExp and GC bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1253099
USN-2936-3: Firefox regression | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2936-3
Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Gain Elevated Privileges, Bypass Security Restrictions, and Obtain Potentially Sensitive Information - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035692
[security-announce] openSUSE-SU-2016:1769-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1769
1256065 - crash in mozilla::GMPVideoDecoder::GMPInitDone bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1256065
[security-announce] openSUSE-SU-2016:1778-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1778
Miscellaneous memory safety hazards (rv:46.0 / rv:45.1 / rv:38.8) — Mozilla Vendor Advisory
www.mozilla.org
text/html
URL Logo CONFIRM www.mozilla.org/security/announce/2016/mfsa2016-39.html
1242668 - Memory corruption in mozilla::layers::ClientLayerManager::DidComposite appears to be exploitable /use after free bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1242668
[security-announce] openSUSE-SU-2016:1767-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1767
1260439 - workerdebuggersandbox_moved needs to update the wrappercache bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1260439

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
ApplicationMozillaFirefox45.0.1AllAllAll
ApplicationMozillaFirefox45.0.1AllAllAll
ApplicationMozillaFirefoxAllAllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseOpensuse13.1AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
Operating
System
OpensuseOpensuse13.1AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
Operating
System
SuseLinux Enterprise12.0AllAllAll
Operating
System
SuseLinux Enterprise12.0AllAllAll
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*: