CVE-2016-2814

Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html
http://rhn.redhat.com/errata/RHSA-2016-0695.html
http://www.debian.org/security/2016/dsa-3559
http://www.mozilla.org/security/announce/2016/mfsa2016-44.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securitytracker.com/id/1035692
http://www.ubuntu.com/usn/USN-2936-1
http://www.ubuntu.com/usn/USN-2936-2
http://www.ubuntu.com/usn/USN-2936-3
https://bugzilla.mozilla.org/show_bug.cgi?id=1254721
https://security.gentoo.org/glsa/201701-15
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html
http://rhn.redhat.com/errata/RHSA-2016-0695.html
http://www.debian.org/security/2016/dsa-3559
http://www.mozilla.org/security/announce/2016/mfsa2016-44.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securitytracker.com/id/1035692
http://www.ubuntu.com/usn/USN-2936-1
http://www.ubuntu.com/usn/USN-2936-2
http://www.ubuntu.com/usn/USN-2936-3
https://bugzilla.mozilla.org/show_bug.cgi?id=1254721
https://security.gentoo.org/glsa/201701-15
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:48

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html - () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html - () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html - () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html -
References () http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html - () http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html -
References () http://rhn.redhat.com/errata/RHSA-2016-0695.html - () http://rhn.redhat.com/errata/RHSA-2016-0695.html -
References () http://www.debian.org/security/2016/dsa-3559 - () http://www.debian.org/security/2016/dsa-3559 -
References () http://www.mozilla.org/security/announce/2016/mfsa2016-44.html - Vendor Advisory () http://www.mozilla.org/security/announce/2016/mfsa2016-44.html - Vendor Advisory
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -
References () http://www.securitytracker.com/id/1035692 - () http://www.securitytracker.com/id/1035692 -
References () http://www.ubuntu.com/usn/USN-2936-1 - () http://www.ubuntu.com/usn/USN-2936-1 -
References () http://www.ubuntu.com/usn/USN-2936-2 - () http://www.ubuntu.com/usn/USN-2936-2 -
References () http://www.ubuntu.com/usn/USN-2936-3 - () http://www.ubuntu.com/usn/USN-2936-3 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1254721 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1254721 -
References () https://security.gentoo.org/glsa/201701-15 - () https://security.gentoo.org/glsa/201701-15 -

22 Oct 2024, 13:42

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:firefox_esr:38.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:38.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:38.3.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:38.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:38.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*

21 Oct 2024, 13:11

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:38.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:38.7.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*

Information

Published : 2016-04-30 17:59

Updated : 2024-11-21 02:48


NVD link : CVE-2016-2814

Mitre link : CVE-2016-2814

CVE.ORG link : CVE-2016-2814


JSON object : View

Products Affected

mozilla

  • firefox
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer