The TCP Socket API implementation in Mozilla Firefox before 41.0 mishandles array boundaries that were established with a navigator.mozTCPSocket.open method call and send method calls, which allows remote TCP servers to obtain sensitive information from process memory by reading packet data, as demonstrated by availability of this API in a Firefox OS application.
References
Configurations
History
21 Nov 2024, 02:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html - | |
References | () http://www.mozilla.org/security/announce/2015/mfsa2015-97.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - | |
References | () http://www.securityfocus.com/bid/76815 - | |
References | () http://www.securitytracker.com/id/1033640 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=994337 - |
Information
Published : 2015-09-24 04:59
Updated : 2024-11-21 02:31
NVD link : CVE-2015-4503
Mitre link : CVE-2015-4503
CVE.ORG link : CVE-2015-4503
JSON object : View
Products Affected
mozilla
- firefox
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor