First published: Thu Sep 24 2015(Updated: )
Use-after-free vulnerability in the HTMLVideoElement interface in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via crafted JavaScript code that modifies the URI table of a media element, aka ZDI-CAN-3176.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | =38.0 | |
Firefox | =38.0.1 | |
Firefox | =38.0.5 | |
Firefox | =38.1.0 | |
Firefox | =38.1.1 | |
Firefox | =38.2.0 | |
Firefox | =38.2.1 | |
Firefox | <=40.0.3 | |
Firefox ESR | =38.0 | |
Firefox ESR | =38.0.1 | |
Firefox ESR | =38.0.5 | |
Firefox ESR | =38.1.0 | |
Firefox ESR | =38.1.1 | |
Firefox ESR | =38.2.0 | |
Firefox ESR | =38.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4509 has a critical severity rating as it allows remote attackers to execute arbitrary code.
To fix CVE-2015-4509, update your Mozilla Firefox or Firefox ESR to the latest version which includes the security patch.
CVE-2015-4509 affects Mozilla Firefox versions prior to 41.0 and Firefox ESR versions before 38.3.
Yes, CVE-2015-4509 can be exploited remotely through crafted JavaScript code targeting the HTMLVideoElement interface.
There are no effective workarounds for CVE-2015-4509; updating to a secure version is the only reliable solution.