8.4 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.052 Low
EPSS
Percentile
93.1%
Integer overflow in the MPEG4Extractor::readMetaData function in MPEG4Extractor.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 on 64-bit platforms allows remote attackers to execute arbitrary code via a crafted MP4 video file that triggers a buffer overflow.
CPE | Name | Operator | Version |
---|---|---|---|
fedora | eq | 22 | |
fedora | eq | 23 | |
firefox | le | 42.0 | |
firefox_esr | eq | 38.3.0 | |
firefox_esr | eq | 38.0 | |
firefox_esr | eq | 38.0.1 | |
firefox_esr | eq | 38.1.0 | |
firefox_esr | eq | 38.4.0 | |
firefox_esr | eq | 38.0.5 | |
firefox_esr | eq | 38.2.1 |
lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
rhn.redhat.com/errata/RHSA-2015-2657.html
www.debian.org/security/2015/dsa-3422
www.debian.org/security/2016/dsa-3432
www.mozilla.org/security/announce/2015/mfsa2015-146.html
www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
www.securityfocus.com/bid/79279
www.securitytracker.com/id/1034426
www.ubuntu.com/usn/USN-2833-1
www.ubuntu.com/usn/USN-2859-1
bugzilla.mozilla.org/show_bug.cgi?id=1206211
lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
security.gentoo.org/glsa/201512-10