First published: Wed Dec 16 2015(Updated: )
Integer underflow in the RTPReceiverVideo::ParseRtpPacket function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 might allow remote attackers to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a crafted WebRTC RTP packet.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fedora | =22 | |
Red Hat Fedora | =23 | |
Firefox | =38.0 | |
Firefox | =38.0.1 | |
Firefox | =38.0.5 | |
Firefox | =38.1.0 | |
Firefox | =38.1.1 | |
Firefox | =38.2.0 | |
Firefox | =38.2.1 | |
Firefox | =38.3.0 | |
Firefox | =38.4.0 | |
SUSE Linux | =42.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Firefox | <=42.0 | |
Firefox ESR | =38.0 | |
Firefox ESR | =38.0.1 | |
Firefox ESR | =38.0.5 | |
Firefox ESR | =38.1.0 | |
Firefox ESR | =38.1.1 | |
Firefox ESR | =38.2.0 | |
Firefox ESR | =38.2.1 | |
Firefox ESR | =38.3.0 | |
Firefox ESR | =38.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7205 has a moderate severity rating due to potential information disclosure and denial of service risks.
To fix CVE-2015-7205, update Mozilla Firefox to version 43.0 or later, or update Firefox ESR to version 38.5 or later.
CVE-2015-7205 can allow remote attackers to obtain sensitive information or cause denial of service.
CVE-2015-7205 affects Mozilla Firefox versions 42.0 and earlier, along with certain versions of Firefox ESR below 38.5.
Yes, CVE-2015-7205 is reported to affect Fedora 22, Fedora 23, and various specific openSUSE versions.