First published: Mon Jul 06 2015(Updated: )
Last updated 24 July 2024
Credit: security@mozilla.org security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/icedove | ||
debian/iceweasel | ||
Mozilla Firefox | <=38.1.0 | |
SUSE Linux Enterprise Software Development Kit | =12.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 | |
SUSE Linux Enterprise Desktop | =12.0 | |
SUSE Linux Enterprise Server | =11-sp4 | |
SUSE Linux Enterprise Server | =12.0 | |
Debian | =7.0 | |
Debian | =8.0 | |
Mozilla Firefox | =31.0 | |
Mozilla Firefox | =31.1.0 | |
Mozilla Firefox | =31.1.1 | |
Mozilla Firefox | =31.3.0 | |
Mozilla Firefox | =31.5.1 | |
Mozilla Firefox | =31.5.2 | |
Mozilla Firefox | =31.5.3 | |
Mozilla Firefox | =38.0 | |
Mozilla Firefox ESR | =31.1 | |
Mozilla Firefox ESR | =31.2 | |
Mozilla Firefox ESR | =31.3 | |
Mozilla Firefox ESR | =31.4 | |
Mozilla Firefox ESR | =31.5 | |
Mozilla Firefox ESR | =31.6.0 | |
Mozilla Firefox ESR | =31.7.0 | |
Oracle Solaris SPARC | =11.3 | |
Mozilla Thunderbird | <=38.0.1 | |
Mozilla Firefox ESR | =31.0 | |
Mozilla Firefox ESR | =31.1.0 | |
Mozilla Firefox ESR | =31.1.1 | |
Mozilla Firefox ESR | =31.3.0 | |
Mozilla Firefox ESR | =31.5.1 | |
Mozilla Firefox ESR | =31.5.2 | |
Mozilla Firefox ESR | =31.5.3 | |
Mozilla Firefox ESR | =38.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2015-2739 is a memory access issue in Mozilla Firefox, Firefox ESR, and Thunderbird, which can lead to unspecified impact and attack vectors.
Mozilla Firefox versions before 39.0, Firefox ESR 31.x before 31.8, and 38.x before 38.1 are affected by CVE-2015-2739.
The severity of vulnerability CVE-2015-2739 is critical with a CVSS score of 10.
To fix the vulnerability CVE-2015-2739, update your Mozilla Firefox, Firefox ESR, or Thunderbird to version 39.0 or later.
You can find more information about vulnerability CVE-2015-2739 in the following references: [link1], [link2], [link3].