Lucene search

K
mozillaMozilla FoundationMFSA2015-123
HistoryNov 03, 2015 - 12:00 a.m.

Buffer overflow during image interactions in canvas — Mozilla

2015-11-0300:00:00
Mozilla Foundation
www.mozilla.org
20

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.091 Low

EPSS

Percentile

94.7%

Security researcher Looben Yang reported a buffer overflow in the JPEGEncoder function during script interactions with a canvas element. This is caused by a race condition and incorrectly matched sizes following image interactions. This leads to a potentially exploitable crash.

Affected configurations

Vulners
Node
mozillafirefoxRange<42
OR
mozillafirefox_esrRange<38.4
OR
mozillathunderbirdRange<38.4
CPENameOperatorVersion
firefoxlt42
firefox esrlt38.4
thunderbirdlt38.4

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.091 Low

EPSS

Percentile

94.7%