CVE-2016-5281

Use-after-free vulnerability in the DOMSVGLength class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:53

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-1912.html - () http://rhn.redhat.com/errata/RHSA-2016-1912.html -
References () http://www.debian.org/security/2016/dsa-3674 - () http://www.debian.org/security/2016/dsa-3674 -
References () http://www.geeknik.net/7gr1u98b9 - Not Applicable () http://www.geeknik.net/7gr1u98b9 - Not Applicable
References () http://www.mozilla.org/security/announce/2016/mfsa2016-85.html - Release Notes, Vendor Advisory () http://www.mozilla.org/security/announce/2016/mfsa2016-85.html - Release Notes, Vendor Advisory
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html - () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html -
References () http://www.securityfocus.com/bid/93049 - () http://www.securityfocus.com/bid/93049 -
References () http://www.securitytracker.com/id/1036852 - () http://www.securitytracker.com/id/1036852 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1284690 - Issue Tracking, Third Party Advisory, VDB Entry () https://bugzilla.mozilla.org/show_bug.cgi?id=1284690 - Issue Tracking, Third Party Advisory, VDB Entry
References () https://security.gentoo.org/glsa/201701-15 - () https://security.gentoo.org/glsa/201701-15 -
References () https://www.mozilla.org/security/advisories/mfsa2016-86/ - () https://www.mozilla.org/security/advisories/mfsa2016-86/ -
References () https://www.mozilla.org/security/advisories/mfsa2016-88/ - () https://www.mozilla.org/security/advisories/mfsa2016-88/ -

21 Oct 2024, 13:55

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:firefox_esr:45.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:45.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*

21 Oct 2024, 13:11

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*

Information

Published : 2016-09-22 22:59

Updated : 2024-11-21 02:53


NVD link : CVE-2016-5281

Mitre link : CVE-2016-5281

CVE.ORG link : CVE-2016-5281


JSON object : View

Products Affected

mozilla

  • firefox
CWE
CWE-416

Use After Free