Mozilla Firefox 43.x mishandles attempts to connect to the Application Reputation service, which makes it easier for remote attackers to trigger an unintended download by leveraging the absence of reputation data.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 02:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html - Third Party Advisory | |
References | () http://www.mozilla.org/security/announce/2016/mfsa2016-11.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/81949 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1034825 - | |
References | () http://www.ubuntu.com/usn/USN-2880-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-2880-2 - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1237103 - Issue Tracking, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201605-06 - Third Party Advisory, VDB Entry |
Information
Published : 2016-01-31 18:59
Updated : 2024-11-21 02:47
NVD link : CVE-2016-1947
Mitre link : CVE-2016-1947
CVE.ORG link : CVE-2016-1947
JSON object : View
Products Affected
mozilla
- firefox
canonical
- ubuntu_linux
opensuse
- opensuse
- leap
CWE
CWE-19
Data Processing Errors