First published: Thu Sep 24 2015(Updated: )
Buffer overflow in the vp9_init_context_buffers function in libvpx, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3, allows remote attackers to execute arbitrary code via a crafted VP9 file.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <=40.0.3 | |
Firefox | =38.0 | |
Firefox | =38.0.1 | |
Firefox | =38.0.5 | |
Firefox | =38.1.0 | |
Firefox | =38.1.1 | |
Firefox | =38.2.0 | |
Firefox | =38.2.1 | |
Firefox ESR | =38.0 | |
Firefox ESR | =38.0.1 | |
Firefox ESR | =38.0.5 | |
Firefox ESR | =38.1.0 | |
Firefox ESR | =38.1.1 | |
Firefox ESR | =38.2.0 | |
Firefox ESR | =38.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4506 has a high severity rating due to its potential to enable remote attackers to execute arbitrary code.
To fix CVE-2015-4506, update Mozilla Firefox or Firefox ESR to version 41.0 or later.
CVE-2015-4506 affects Mozilla Firefox versions prior to 41.0 and Firefox ESR versions prior to 38.3.
Yes, CVE-2015-4506 can be exploited by opening a crafted VP9 file in the affected versions of Mozilla Firefox.
The potential impacts of CVE-2015-4506 include unauthorized execution of code and compromise of the user's system.