Description
Multiple serious vulnerabilities have been found in Mozilla Firefox before 37.0, Mozilla Firefox ESR 31.x before 31.6, Mozilla Thunderbird before 31.6. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause a denial of service (heap memory corruption) and bypass an intended user-confirmation requirement.
Below is a complete list of vulnerabilities
- Improper resource:URLs restrictions, which can lead to execution arbitrary JavaScript code to bypass the Same Origin Policy;
- Multiple unspecified vulnerabilities in the browser engine can be exploited via unknown vectors;
- Lack of HTTPS session enforcement for lightweight theme add-on installations in Mozilla Firefox before 37.0 can lead to man-in-the-middle attacks;
- The QCMS implementation in Mozilla Firefox can be exploited via an image that is improperly handled during transformation;
- The webrtc::VPMContentAnalysis::Release function in the WebRTC implementation in Mozilla Firefox before 37.0 can be exploited via unspecified vectors;
- The navigator.sendBeacon implementation can be exploited via a crafted web site;
- The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 can be exploited via vectors that trigger rendering of 2D graphics content;
- The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 can be exploited via a crafted HTML document containing a SOURCE element.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2015-0812 warning
- CVE-2015-0813 high
- CVE-2015-0810 warning
- CVE-2015-0811 high
- CVE-2015-0815 critical
- CVE-2015-0814 critical
- CVE-2015-0805 critical
- CVE-2015-0806 critical
- CVE-2015-0804 critical
- CVE-2015-0816 critical
- CVE-2015-0807 high
- CVE-2015-0808 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!