First published: Wed Dec 16 2015(Updated: )
Integer underflow in the Metadata::setData function in MetaData.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code or cause a denial of service (incorrect memory allocation and application crash) via an MP4 video file with crafted covr metadata that triggers a buffer overflow.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =38.0 | |
Mozilla Firefox | =38.0.1 | |
Mozilla Firefox | =38.0.5 | |
Mozilla Firefox | =38.1.0 | |
Mozilla Firefox | =38.1.1 | |
Mozilla Firefox | =38.2.0 | |
Mozilla Firefox | =38.2.1 | |
Mozilla Firefox | =38.3.0 | |
Mozilla Firefox | =38.4.0 | |
openSUSE | =42.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Fedoraproject Fedora | =22 | |
Fedoraproject Fedora | =23 | |
Mozilla Firefox | <=42.0 | |
Mozilla Firefox ESR | =38.0 | |
Mozilla Firefox ESR | =38.0.1 | |
Mozilla Firefox ESR | =38.0.5 | |
Mozilla Firefox ESR | =38.1.0 | |
Mozilla Firefox ESR | =38.1.1 | |
Mozilla Firefox ESR | =38.2.0 | |
Mozilla Firefox ESR | =38.2.1 | |
Mozilla Firefox ESR | =38.3.0 | |
Mozilla Firefox ESR | =38.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7222 has a high severity rating due to its potential to allow remote attackers to execute arbitrary code or cause a denial of service.
To fix CVE-2015-7222, update Mozilla Firefox and Firefox ESR to version 43.0 or later, or apply the relevant security patches provided by your operating system vendor.
CVE-2015-7222 affects Mozilla Firefox versions up to 42.0 and Firefox ESR versions up to 38.4.0.
CVE-2015-7222 allows attackers to exploit an integer underflow vulnerability which can lead to arbitrary code execution or application crashes.
There are no effective workarounds for CVE-2015-7222 other than upgrading to the secure versions of the browsers.