6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Multiple security flaws were found in the graphite2 font library shipped with Firefox. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1521, CVE-2016-1522, CVE-2016-1523) All Firefox users should upgrade to these updated packages, which contain Firefox version 38.6.1 ESR, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect.
blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
lists.fedoraproject.org/pipermail/package-announce/2016-February/177520.html
lists.fedoraproject.org/pipermail/package-announce/2016-May/184623.html
lists.opensuse.org/opensuse-security-announce/2016-02/msg00053.html
lists.opensuse.org/opensuse-security-announce/2016-02/msg00055.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html
rhn.redhat.com/errata/RHSA-2016-0197.html
rhn.redhat.com/errata/RHSA-2016-0258.html
rhn.redhat.com/errata/RHSA-2016-0594.html
www.debian.org/security/2016/dsa-3477
www.debian.org/security/2016/dsa-3479
www.debian.org/security/2016/dsa-3491
www.mozilla.org/security/announce/2016/mfsa2016-14.html
www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
www.securityfocus.com/bid/82991
www.securitytracker.com/id/1035017
www.ubuntu.com/usn/USN-2902-1
www.ubuntu.com/usn/USN-2904-1
access.redhat.com/security/updates/classification/#critical
bugzilla.mozilla.org/show_bug.cgi?id=1246093
bugzilla.redhat.com/show_bug.cgi?id=1306496
rhn.redhat.com/errata/RHSA-2016-0197.html
security.gentoo.org/glsa/201605-06
security.gentoo.org/glsa/201701-35
security.gentoo.org/glsa/201701-63
www.mozilla.org/security/announce/2016/mfsa2016-14.html
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P