{"api_version":"1","generated_at":"2026-04-23T12:32:47+00:00","cve":"CVE-2016-2830","urls":{"html":"https://cve.report/CVE-2016-2830","api":"https://cve.report/api/cve/CVE-2016-2830.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2016-2830","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2016-2830"},"summary":{"title":"CVE-2016-2830","description":"Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses.","state":"PUBLIC","assigner":"security@mozilla.org","published_at":"2016-08-05 01:59:00","updated_at":"2017-08-16 01:29:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","name":"openSUSE-SU-2016:1964","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2016:1964-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","name":"openSUSE-SU-2016:2026","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2016:2026-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201701-15","name":"GLSA-201701-15","refsource":"GENTOO","tags":[],"title":"Mozilla Firefox, Thunderbird: Multiple vulnerabilities (GLSA 201701-15) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","name":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","refsource":"CONFIRM","tags":[],"title":"Oracle Linux Bulletin - July 2016","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-63.html","name":"http://www.mozilla.org/security/announce/2016/mfsa2016-63.html","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Favicon network connection can persist when page is closed — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-3044-1","name":"USN-3044-1","refsource":"UBUNTU","tags":[],"title":"USN-3044-1: Firefox vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2016/dsa-3640","name":"DSA-3640","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-3640-1 firefox-esr","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/92261","name":"92261","refsource":"BID","tags":[],"title":"Mozilla Firefox Multiple Security Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securitytracker.com/id/1036508","name":"1036508","refsource":"SECTRACK","tags":[],"title":"Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Bypass Security Restrictions, Spoof Content, Modify Files, and Obtain Potentially Sensitive Information - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1255270","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1255270","refsource":"CONFIRM","tags":["Issue Tracking","Permissions Required"],"title":"1255270 - (CVE-2016-2830) Favicon request doesn't timeout, or close when related window is closed","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html","name":"RHSA-2016:1551","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2016-2830","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2830","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2016","cve_id":"2830","vulnerable":"1","versionEndIncluding":"47.0.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2830","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"45.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2830","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"45.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2830","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"45.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2830","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"45.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2830","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"45.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2830","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"45.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2830","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"45.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2830","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"45.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2016-2830","qid":"710500","title":"Gentoo Linux Mozilla Firefox, Thunderbird Multiple Vulnerabilities (GLSA 201701-15)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@mozilla.org","ID":"CVE-2016-2830","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"DSA-3640","refsource":"DEBIAN","url":"http://www.debian.org/security/2016/dsa-3640"},{"name":"1036508","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1036508"},{"name":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"name":"USN-3044-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3044-1"},{"name":"RHSA-2016:1551","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"name":"GLSA-201701-15","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201701-15"},{"name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1255270","refsource":"CONFIRM","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1255270"},{"name":"openSUSE-SU-2016:1964","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"name":"92261","refsource":"BID","url":"http://www.securityfocus.com/bid/92261"},{"name":"http://www.mozilla.org/security/announce/2016/mfsa2016-63.html","refsource":"CONFIRM","url":"http://www.mozilla.org/security/announce/2016/mfsa2016-63.html"},{"name":"openSUSE-SU-2016:2026","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"}]}},"nvd":{"publishedDate":"2016-08-05 01:59:00","lastModifiedDate":"2017-08-16 01:29:00","problem_types":["CWE-200"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","versionEndIncluding":"47.0.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2016","CveId":"2830","Ordinal":"88688","Title":"CVE-2016-2830","CVE":"CVE-2016-2830","Year":"2016"},"notes":[{"CveYear":"2016","CveId":"2830","Ordinal":"1","NoteData":"Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses.","Type":"Description","Title":null},{"CveYear":"2016","CveId":"2830","Ordinal":"2","NoteData":"2016-08-04","Type":"Other","Title":"Published"},{"CveYear":"2016","CveId":"2830","Ordinal":"3","NoteData":"2017-08-15","Type":"Other","Title":"Modified"}]}}}