First published: Sun Jan 31 2016(Updated: )
Mozilla Firefox 43.x mishandles attempts to connect to the Application Reputation service, which makes it easier for remote attackers to trigger an unintended download by leveraging the absence of reputation data.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.04 | |
Ubuntu Linux | =15.10 | |
openSUSE | =42.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Mozilla Firefox | =43.0 | |
Mozilla Firefox | =43.0.1 | |
Mozilla Firefox | =43.0.2 | |
Mozilla Firefox | =43.0.3 | |
Mozilla Firefox | =43.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1947 is classified as a moderate severity vulnerability.
To mitigate CVE-2016-1947, update your Mozilla Firefox to version 43.0.4 or later.
CVE-2016-1947 affects Mozilla Firefox versions 43.0 to 43.0.4 and specific versions of Ubuntu and openSUSE.
CVE-2016-1947 allows remote attackers to unintentionally trigger downloads by exploiting the lack of reputation data.
Yes, CVE-2016-1947 affects users on Ubuntu and openSUSE platforms running vulnerable versions of Firefox.