ID

VAR-201511-0068


CVE

CVE-2015-7192


TITLE

Mac OS X Run on Mozilla Firefox Service disruption in accessibility tools (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-005755

DESCRIPTION

The accessibility-tools feature in Mozilla Firefox before 42.0 on OS X improperly interacts with the implementation of the TABLE element, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using an NSAccessibilityIndexAttribute value to reference a row index. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. Mozilla Firefox is prone to the following vulnerabilities: 1. Multiple information-disclosure vulnerabilities 2. Multiple security-bypass vulnerabilities 3. A privilege escalation vulnerability 4. A denial-of-service vulnerability Attackers can exploit these issues to bypass security restrictions, obtain sensitive information and gain elevated privileges. Failed exploit attempts will likely result in denial-of-service conditions. Versions prior to Firefox 42 are vulnerable. Mozilla Firefox on OS X is an open source web browser based on the OS X platform of the Mozilla Foundation of the United States. There is a security vulnerability in the accessibility-tools function in Mozilla Firefox 42.0.2 and earlier versions based on the OS X platform. The vulnerability stems from the fact that the program does not interact correctly with the TABLE element. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201512-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Mozilla Products: Multiple vulnerabilities Date: December 30, 2015 Bugs: #545232, #554036, #556942, #564818, #568376 ID: 201512-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird, the worst of which may allow user-assisted execution of arbitrary code. Background ========== Mozilla Firefox is an open-source web browser and Mozilla Thunderbird an open-source email client, both from the Mozilla Project. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/firefox < 38.5.0 >= 38.5.0 2 www-client/firefox-bin < 38.5.0 >= 38.5.0 3 mail-client/thunderbird < 38.5.0 >= 38.5.0 4 mail-client/thunderbird-bin < 38.5.0 >= 38.5.0 ------------------------------------------------------------------- 4 affected packages Description =========== Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Thunderbird. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All Firefox users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-38.5.0" All Firefox-bin users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-38.5.0" All Thunderbird users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-38.5.0"= All Thunderbird-bin users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-38.5.0" References ========== [ 1 ] CVE-2015-0798 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0798 [ 2 ] CVE-2015-0799 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0799 [ 3 ] CVE-2015-0801 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0801 [ 4 ] CVE-2015-0802 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0802 [ 5 ] CVE-2015-0803 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0803 [ 6 ] CVE-2015-0804 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0804 [ 7 ] CVE-2015-0805 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0805 [ 8 ] CVE-2015-0806 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0806 [ 9 ] CVE-2015-0807 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0807 [ 10 ] CVE-2015-0808 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0808 [ 11 ] CVE-2015-0810 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0810 [ 12 ] CVE-2015-0811 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0811 [ 13 ] CVE-2015-0812 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0812 [ 14 ] CVE-2015-0813 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0813 [ 15 ] CVE-2015-0814 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0814 [ 16 ] CVE-2015-0815 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0815 [ 17 ] CVE-2015-0816 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0816 [ 18 ] CVE-2015-2706 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2706 [ 19 ] CVE-2015-2721 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721 [ 20 ] CVE-2015-2722 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2722 [ 21 ] CVE-2015-2724 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2724 [ 22 ] CVE-2015-2725 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2725 [ 23 ] CVE-2015-2726 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2726 [ 24 ] CVE-2015-2727 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2727 [ 25 ] CVE-2015-2728 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2728 [ 26 ] CVE-2015-2729 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2729 [ 27 ] CVE-2015-2730 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2730 [ 28 ] CVE-2015-2731 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2731 [ 29 ] CVE-2015-2733 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2733 [ 30 ] CVE-2015-2734 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2734 [ 31 ] CVE-2015-2735 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2735 [ 32 ] CVE-2015-2736 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2736 [ 33 ] CVE-2015-2737 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2737 [ 34 ] CVE-2015-2738 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2738 [ 35 ] CVE-2015-2739 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2739 [ 36 ] CVE-2015-2740 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2740 [ 37 ] CVE-2015-2741 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2741 [ 38 ] CVE-2015-2742 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2742 [ 39 ] CVE-2015-2743 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2743 [ 40 ] CVE-2015-2808 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2808 [ 41 ] CVE-2015-4000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000 [ 42 ] CVE-2015-4495 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4495 [ 43 ] CVE-2015-4513 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4513 [ 44 ] CVE-2015-4514 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4514 [ 45 ] CVE-2015-4515 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4515 [ 46 ] CVE-2015-4518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4518 [ 47 ] CVE-2015-7181 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181 [ 48 ] CVE-2015-7182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182 [ 49 ] CVE-2015-7183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183 [ 50 ] CVE-2015-7187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7187 [ 51 ] CVE-2015-7188 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7188 [ 52 ] CVE-2015-7189 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7189 [ 53 ] CVE-2015-7191 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7191 [ 54 ] CVE-2015-7192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7192 [ 55 ] CVE-2015-7193 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7193 [ 56 ] CVE-2015-7194 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7194 [ 57 ] CVE-2015-7195 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7195 [ 58 ] CVE-2015-7196 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7196 [ 59 ] CVE-2015-7197 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7197 [ 60 ] CVE-2015-7198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7198 [ 61 ] CVE-2015-7199 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7199 [ 62 ] CVE-2015-7200 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7200 [ 63 ] CVE-2015-7201 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7201 [ 64 ] CVE-2015-7202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7202 [ 65 ] CVE-2015-7203 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7203 [ 66 ] CVE-2015-7204 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7204 [ 67 ] CVE-2015-7205 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7205 [ 68 ] CVE-2015-7207 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7207 [ 69 ] CVE-2015-7208 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7208 [ 70 ] CVE-2015-7210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7210 [ 71 ] CVE-2015-7211 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7211 [ 72 ] CVE-2015-7212 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7212 [ 73 ] CVE-2015-7213 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7213 [ 74 ] CVE-2015-7214 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7214 [ 75 ] CVE-2015-7215 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7215 [ 76 ] CVE-2015-7216 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7216 [ 77 ] CVE-2015-7217 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7217 [ 78 ] CVE-2015-7218 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7218 [ 79 ] CVE-2015-7219 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7219 [ 80 ] CVE-2015-7220 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7220 [ 81 ] CVE-2015-7221 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7221 [ 82 ] CVE-2015-7222 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7222 [ 83 ] CVE-2015-7223 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7223 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201512-10 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.16

sources: NVD: CVE-2015-7192 // JVNDB: JVNDB-2015-005755 // BID: 77412 // VULHUB: VHN-85153 // VULMON: CVE-2015-7192 // PACKETSTORM: 135088

AFFECTED PRODUCTS

vendor:mozillamodel:firefoxscope:lteversion:41.0.2

Trust: 1.0

vendor:mozillamodel:firefoxscope:ltversion:42.0 (os x)

Trust: 0.8

vendor:mozillamodel:firefoxscope:eqversion:41.0.2

Trust: 0.6

vendor:mozillamodel:firefoxscope:eqversion:9.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.28

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.22

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.10.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.6.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:9.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:8.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:8.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:5.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:5.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:4.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.27

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.26

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.25

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.24

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.23

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.21

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.20

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:12.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:11.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.4.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.2

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

sources: BID: 77412 // JVNDB: JVNDB-2015-005755 // CNNVD: CNNVD-201511-086 // NVD: CVE-2015-7192

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7192
value: HIGH

Trust: 1.0

NVD: CVE-2015-7192
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201511-086
value: HIGH

Trust: 0.6

VULHUB: VHN-85153
value: HIGH

Trust: 0.1

VULMON: CVE-2015-7192
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-7192
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-85153
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-85153 // VULMON: CVE-2015-7192 // JVNDB: JVNDB-2015-005755 // CNNVD: CNNVD-201511-086 // NVD: CVE-2015-7192

PROBLEMTYPE DATA

problemtype:CWE-17

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-85153 // JVNDB: JVNDB-2015-005755 // NVD: CVE-2015-7192

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201511-086

TYPE

Unknown

Trust: 0.3

sources: BID: 77412

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-005755

PATCH

title:MFSA2015-126url:http://www.mozilla.org/security/announce/2015/mfsa2015-126.html

Trust: 0.8

title:MFSA2015-126url:http://www.mozilla-japan.org/security/announce/2015/mfsa2015-126.html

Trust: 0.8

title:Mozilla Firefox Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58582

Trust: 0.6

title:Mozilla: Mozilla Foundation Security Advisory 2015-126url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=2015-126

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=976a4da35d55283870dbb31b88a6c655

Trust: 0.1

sources: VULMON: CVE-2015-7192 // JVNDB: JVNDB-2015-005755 // CNNVD: CNNVD-201511-086

EXTERNAL IDS

db:NVDid:CVE-2015-7192

Trust: 3.0

db:SECTRACKid:1034069

Trust: 1.2

db:BIDid:77412

Trust: 1.0

db:JVNDBid:JVNDB-2015-005755

Trust: 0.8

db:CNNVDid:CNNVD-201511-086

Trust: 0.7

db:NSFOCUSid:31464

Trust: 0.6

db:VULHUBid:VHN-85153

Trust: 0.1

db:VULMONid:CVE-2015-7192

Trust: 0.1

db:PACKETSTORMid:135088

Trust: 0.1

sources: VULHUB: VHN-85153 // VULMON: CVE-2015-7192 // BID: 77412 // JVNDB: JVNDB-2015-005755 // PACKETSTORM: 135088 // CNNVD: CNNVD-201511-086 // NVD: CVE-2015-7192

REFERENCES

url:http://www.mozilla.org/security/announce/2015/mfsa2015-126.html

Trust: 1.8

url:https://bugzilla.mozilla.org/show_bug.cgi?id=1210023

Trust: 1.8

url:https://security.gentoo.org/glsa/201512-10

Trust: 1.3

url:http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

Trust: 1.2

url:http://www.securitytracker.com/id/1034069

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7192

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7192

Trust: 0.8

url:http://www.securityfocus.com/bid/77412

Trust: 0.7

url:http://www.nsfocus.net/vulndb/31464

Trust: 0.6

url:https://www.mozilla.org/en-us/security/advisories/mfsa2015-126/

Trust: 0.4

url:http://www.mozilla.com/en-us/

Trust: 0.3

url:https://www.mozilla.org/en-us/security/advisories/mfsa2015-117/

Trust: 0.3

url:https://www.mozilla.org/en-us/security/advisories/mfsa2015-118/

Trust: 0.3

url:https://www.mozilla.org/en-us/security/advisories/mfsa2015-119/

Trust: 0.3

url:https://www.mozilla.org/en-us/security/advisories/mfsa2015-120/

Trust: 0.3

url:https://www.mozilla.org/en-us/security/advisories/mfsa2015-121/

Trust: 0.3

url:https://www.mozilla.org/en-us/security/advisories/mfsa2015-124/

Trust: 0.3

url:https://www.mozilla.org/en-us/security/advisories/mfsa2015-125/

Trust: 0.3

url:https://www.mozilla.org/en-us/security/advisories/mfsa2015-129/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/17.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0810

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2730

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7204

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0803

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0802

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0801

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0805

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0812

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7223

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7182

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7193

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2721

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7219

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2729

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4495

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7216

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0802

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2743

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4518

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2808

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7181

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2737

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2733

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2739

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2726

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7215

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0806

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0814

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7195

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7208

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7199

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0808

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7187

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7183

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7207

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0804

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0801

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0807

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2724

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2735

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0805

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0799

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2724

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7201

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7218

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7200

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7192

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7196

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4513

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7203

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2721

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2728

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7197

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0816

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2731

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0810

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7205

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7194

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7211

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2730

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7221

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7217

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2742

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7191

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0812

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0811

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7212

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0813

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7188

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7189

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7210

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7202

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7220

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0799

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4515

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2736

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7214

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4514

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2729

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2738

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7198

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0815

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2740

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2728

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0811

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4000

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0813

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0798

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2726

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7222

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2727

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0798

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2725

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2706

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2734

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2741

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0804

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0808

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0815

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2706

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2727

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0816

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2725

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2731

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2722

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2722

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0803

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7213

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0814

Trust: 0.1

sources: VULHUB: VHN-85153 // VULMON: CVE-2015-7192 // BID: 77412 // JVNDB: JVNDB-2015-005755 // PACKETSTORM: 135088 // CNNVD: CNNVD-201511-086 // NVD: CVE-2015-7192

CREDITS

Tim Brown, Mario Heiderich, Frederik Braun, Jordi Chancel, Jason Hamilton, Peter Arremann, Sylvain Giroux, Muneaki Nishimura, Frédéric Wang and Frans Rosén.

Trust: 0.6

sources: CNNVD: CNNVD-201511-086

SOURCES

db:VULHUBid:VHN-85153
db:VULMONid:CVE-2015-7192
db:BIDid:77412
db:JVNDBid:JVNDB-2015-005755
db:PACKETSTORMid:135088
db:CNNVDid:CNNVD-201511-086
db:NVDid:CVE-2015-7192

LAST UPDATE DATE

2024-11-23T19:47:51.405000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-85153date:2016-12-07T00:00:00
db:VULMONid:CVE-2015-7192date:2016-12-07T00:00:00
db:BIDid:77412date:2016-01-14T23:52:00
db:JVNDBid:JVNDB-2015-005755date:2015-11-06T00:00:00
db:CNNVDid:CNNVD-201511-086date:2015-11-06T00:00:00
db:NVDid:CVE-2015-7192date:2024-11-21T02:36:18.717

SOURCES RELEASE DATE

db:VULHUBid:VHN-85153date:2015-11-05T00:00:00
db:VULMONid:CVE-2015-7192date:2015-11-05T00:00:00
db:BIDid:77412date:2015-11-03T00:00:00
db:JVNDBid:JVNDB-2015-005755date:2015-11-06T00:00:00
db:PACKETSTORMid:135088date:2015-12-30T16:38:58
db:CNNVDid:CNNVD-201511-086date:2015-11-05T00:00:00
db:NVDid:CVE-2015-7192date:2015-11-05T05:59:16.183