First published: Mon Jun 13 2016(Updated: )
Use-after-free vulnerability in the mozilla::dom::Element class in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2, when contenteditable mode is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering deletion of DOM elements that were created in the editor.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <=46.0.1 | |
Firefox | =45.1.0 | |
Firefox | =45.1.1 | |
Debian | =8.0 | |
SUSE Linux | =42.1 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
Firefox ESR | =45.1.0 | |
Firefox ESR | =45.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-2821 is considered high due to its potential to execute arbitrary code or cause denial of service.
To fix CVE-2016-2821, update to Mozilla Firefox version 47.0 or later, or Firefox ESR 45.2 or later.
CVE-2016-2821 affects Mozilla Firefox versions prior to 47.0 and Firefox ESR versions before 45.2.
CVE-2016-2821 is caused by a use-after-free vulnerability in the mozilla::dom::Element class when contenteditable mode is enabled.
Yes, CVE-2016-2821 can affect web applications due to the ability of remote attackers to exploit the vulnerability.