Vulnerability identifier: #VU1018
Vulnerability risk: Medium
CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Mozilla Firefox
Client/Desktop applications /
Web browsers
Firefox ESR
Client/Desktop applications /
Web browsers
Mozilla Thunderbird
Client/Desktop applications /
Messaging software
Oracle Solaris
Operating systems & Components /
Operating system
Oracle Linux
Operating systems & Components /
Operating system
Description
The vulnerability allows a remote unauthenticated user to cause DoS conditions on the target system.
The weakness is due to improper input validation. By convincing a victim to visit a malicious website, attackers can overwrite an add-on resource that may lead to denial of service or privilege escalation.
Successful exploitation of the vulnerability will result in denial of service on the vulnerable system.
Mitigation
Update Firefox to version 45.
Update Firefox ESR to version 38.7.
Update Thunderbird to version 38.7 or 45.
Vulnerable software versions
Mozilla Firefox: 40.0 - 44.0
Firefox ESR: 38.0 - 38.6.0
Mozilla Thunderbird: 38.0 - 38.6, 37.0, 36.0, 35.0, 34.0
Oracle Solaris: 11.3
Oracle Linux: 5 - 7
External links
http://tools.cisco.com/security/center/viewAlert.x?alertId=43941
http://www.mozilla.org/en-US/security/advisories/mfsa2016-17/
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.