First published: Wed Apr 01 2015(Updated: )
The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Firefox | <=36.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0803 is considered a critical vulnerability due to its potential to allow remote code execution and denial of service.
To fix CVE-2015-0803, upgrade Mozilla Firefox to version 37.0 or later.
CVE-2015-0803 affects Mozilla Firefox versions up to 36.0.4 and specific versions of Ubuntu and openSUSE.
CVE-2015-0803 can be exploited to execute arbitrary code or cause a use-after-free denial of service.
There is no known workaround for CVE-2015-0803, so updating the affected software is the recommended action.