First published: Mon Jun 06 2016(Updated: )
Last updated 24 July 2024
Credit: security@mozilla.org security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=47.0.1 | |
Mozilla Firefox ESR | =45.1.0 | |
Mozilla Firefox ESR | =45.1.1 | |
Mozilla Firefox ESR | =45.2.0 | |
Mozilla Firefox ESR | =45.3.0 | |
Mozilla Firefox | =45.1.0 | |
Mozilla Firefox | =45.1.1 | |
Mozilla Firefox | =45.2.0 | |
Mozilla Firefox | =45.3.0 | |
debian/firefox | 132.0.2-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.4.0esr-1~deb11u1 128.3.1esr-1~deb12u1 128.4.0esr-1~deb12u1 128.4.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2830 is a vulnerability in Mozilla Firefox and Firefox ESR that allows remote web servers to track users by observing network traffic from multiple IP addresses.
The severity of CVE-2016-2830 is medium with a severity value of 4.3.
CVE-2016-2830 allows the network connection used for favicon resource retrieval to be preserved even after the associated browser window is closed, making it easier for remote web servers to track users.
Mozilla Firefox versions up to 47.0.1 and Firefox ESR versions 45.x before 45.3 are affected by CVE-2016-2830.
To fix CVE-2016-2830, update your Mozilla Firefox to version 48.0 or later, or update your Firefox ESR to version 45.3 or later.