First published: Fri Aug 05 2016(Updated: )
An integer overflow error in WebSockets during data buffering on incoming packets resulting in attacker controlled data being written at a known offset in the allocated buffer.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <45.4 | 45.4 |
Mozilla Firefox | <=47.0.1 | |
debian/firefox | 132.0.2-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.4.0esr-1~deb11u1 128.3.1esr-1~deb12u1 128.4.0esr-1~deb12u1 128.3.1esr-2 128.4.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2016-5261 is an integer overflow error in WebSockets during data buffering on incoming packets resulting in arbitrary code execution or denial of service in Mozilla Firefox before version 48.0 and Firefox ESR before version 45.4.
CVE-2016-5261 affects Mozilla Firefox versions before 48.0 and Firefox ESR versions before 45.4, allowing remote attackers to execute arbitrary code or cause a denial of service through crafted packets.
CVE-2016-5261 has a severity rating of 8.8 (High).
To fix CVE-2016-5261 in Mozilla Firefox, update to version 48.0 or later for regular Firefox, or version 45.4 or later for Firefox ESR.
You can find more information about CVE-2016-5261 in the following references: [Link 1](https://bugzilla.mozilla.org/show_bug.cgi?id=1287266), [Link 2](https://www.mozilla.org/en-US/security/advisories/mfsa2016-86/), [Link 3](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5261).