First published: Mon Jun 13 2016(Updated: )
Heap-based buffer overflow in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via foreign-context HTML5 fragments, as demonstrated by fragments within an SVG element.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =42.1 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Firefox | =45.1.0 | |
Firefox | =45.1.1 | |
Debian | =8.0 | |
Firefox | <=46.0.1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
Firefox ESR | =45.1.0 | |
Firefox ESR | =45.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2819 is classified as a critical vulnerability due to its potential for remote code execution.
CVE-2016-2819 affects Mozilla Firefox versions before 47.0, Firefox ESR versions before 45.2, and various versions of openSUSE, Debian, and Ubuntu.
To mitigate CVE-2016-2819, users should update Mozilla Firefox to version 47.0 or later and Firefox ESR to version 45.2 or later.
CVE-2016-2819 is a heap-based buffer overflow vulnerability that allows attackers to execute arbitrary code.
Yes, CVE-2016-2819 can be exploited via specially crafted HTML5 fragments within SVG elements in web content.