Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.2.1.2016.50
Category:General
Title:Mozilla Firefox Security Advisory (MFSA2016-50) - Linux
Summary:This host is missing a security update for Mozilla Firefox.
Description:Summary:
This host is missing a security update for Mozilla Firefox.

Vulnerability Insight:
Buffer overflow parsing HTML5 fragments
Security researcher firehack reported a buffer overflow when parsing
HTML5 fragments in a foreign context such as under an node. This
results in a potentially exploitable crash when inserting an HTML fragment into an
existing document.

Affected Software/OS:
Firefox version(s) below 47.

Solution:
The vendor has released an update. Please see the reference(s) for more information.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-2819
BugTraq ID: 91075
http://www.securityfocus.com/bid/91075
Debian Security Information: DSA-3600 (Google Search)
http://www.debian.org/security/2016/dsa-3600
https://www.exploit-db.com/exploits/44293/
RedHat Security Advisories: RHSA-2016:1217
https://access.redhat.com/errata/RHSA-2016:1217
http://www.securitytracker.com/id/1036057
SuSE Security Announcement: SUSE-SU-2016:1691 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html
SuSE Security Announcement: openSUSE-SU-2016:1552 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html
SuSE Security Announcement: openSUSE-SU-2016:1557 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
http://www.ubuntu.com/usn/USN-2993-1
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.