First published: Sun Aug 16 2015(Updated: )
Heap-based buffer overflow in the stagefright::ESDS::parseESDescriptor function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via an invalid size field in an esds chunk in MPEG-4 video data, a related issue to CVE-2015-1539.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris and Zettabyte File System (ZFS) | =11.3 | |
Firefox | <=39.0.3 | |
Firefox | =38.0 | |
Firefox | =38.0.1 | |
Firefox | =38.0.5 | |
Firefox | =38.1.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Firefox ESR | =38.0 | |
Firefox ESR | =38.0.1 | |
Firefox ESR | =38.0.5 | |
Firefox ESR | =38.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4493 is considered critical due to its potential to allow remote code execution.
To fix CVE-2015-4493, update Mozilla Firefox to version 40.0 or later, or Firefox ESR to version 38.2 or later.
CVE-2015-4493 affects Firefox versions prior to 40.0 and Firefox ESR versions prior to 38.2.
Yes, CVE-2015-4493 can be exploited remotely through crafted MPEG-4 video data.
CVE-2015-4493 primarily affects users on Firefox and Firefox ESR running on various operating systems including Oracle Solaris and Ubuntu.