First published: Mon Jul 06 2015(Updated: )
Buffer overflow in the nsXMLHttpRequest::AppendToResponseText function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 might allow remote attackers to cause a denial of service or have unspecified other impact via unknown vectors.
Credit: security@mozilla.org security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/icedove | ||
debian/iceweasel | ||
Mozilla Thunderbird | <=38.0.1 | |
Mozilla Firefox ESR | =31.0 | |
Mozilla Firefox ESR | =31.1 | |
Mozilla Firefox ESR | =31.1.0 | |
Mozilla Firefox ESR | =31.1.1 | |
Mozilla Firefox ESR | =31.2 | |
Mozilla Firefox ESR | =31.3 | |
Mozilla Firefox ESR | =31.3.0 | |
Mozilla Firefox ESR | =31.4 | |
Mozilla Firefox ESR | =31.5 | |
Mozilla Firefox ESR | =31.5.1 | |
Mozilla Firefox ESR | =31.5.2 | |
Mozilla Firefox ESR | =31.5.3 | |
Mozilla Firefox ESR | =31.6.0 | |
Mozilla Firefox ESR | =31.7.0 | |
Mozilla Firefox ESR | =38.0 | |
Novell Suse Linux Enterprise Software Development Kit | =12.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 | |
Canonical Ubuntu Linux | =15.04 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Novell Suse Linux Enterprise Desktop | =12.0 | |
Novell Suse Linux Enterprise Server | =11-sp4 | |
Novell Suse Linux Enterprise Server | =12.0 | |
Mozilla Firefox | <=38.1.0 | |
Oracle Solaris | =11.3 | |
Mozilla Firefox | =31.0 | |
Mozilla Firefox | =31.1.0 | |
Mozilla Firefox | =31.1.1 | |
Mozilla Firefox | =31.3.0 | |
Mozilla Firefox | =31.5.1 | |
Mozilla Firefox | =31.5.2 | |
Mozilla Firefox | =31.5.3 | |
Mozilla Firefox | =38.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-2740 is critical with a severity value of 10.
Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1.
It can be exploited through buffer overflow in the nsXMLHttpRequest::AppendToResponseText function.
Upgrade to Mozilla Firefox 39.0 or higher, Thunderbird 31.8 or higher.
You can find more information about CVE-2015-2740 at the following references: [http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html), [http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html), [http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html).