First published: Sat Apr 30 2016(Updated: )
Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=45.0.2 | |
Mozilla Firefox | =45.0.1 | |
Mozilla Firefox ESR | =38.0 | |
Mozilla Firefox ESR | =38.0.1 | |
Mozilla Firefox ESR | =38.0.5 | |
Mozilla Firefox ESR | =38.1.0 | |
Mozilla Firefox ESR | =38.1.1 | |
Mozilla Firefox ESR | =38.2.0 | |
Mozilla Firefox ESR | =38.2.1 | |
Mozilla Firefox ESR | =38.3.0 | |
Mozilla Firefox ESR | =38.4.0 | |
Mozilla Firefox ESR | =38.5.0 | |
Mozilla Firefox ESR | =38.5.1 | |
Mozilla Firefox ESR | =38.6.0 | |
Mozilla Firefox ESR | =38.6.1 | |
Mozilla Firefox ESR | =38.7.0 | |
Mozilla Firefox ESR | =38.7.1 | |
Mozilla Firefox | =38.0 | |
Mozilla Firefox | =38.0.1 | |
Mozilla Firefox | =38.0.5 | |
Mozilla Firefox | =38.1.0 | |
Mozilla Firefox | =38.1.1 | |
Mozilla Firefox | =38.2.0 | |
Mozilla Firefox | =38.2.1 | |
Mozilla Firefox | =38.3.0 | |
Mozilla Firefox | =38.4.0 | |
Mozilla Firefox | =38.5.0 | |
Mozilla Firefox | =38.5.1 | |
Mozilla Firefox | =38.6.0 | |
Mozilla Firefox | =38.6.1 | |
Mozilla Firefox | =38.7.0 | |
Mozilla Firefox | =38.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2814 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2016-2814, update your Firefox browser to version 46.0 or later.
CVE-2016-2814 affects Mozilla Firefox versions before 46.0 and Firefox ESR versions before 38.8 and 45.1.
Yes, CVE-2016-2814 can be exploited remotely via crafted CENC offsets.
CVE-2016-2814 can lead to arbitrary code execution, which may compromise user data and system integrity.