First published: Tue Nov 15 2016(Updated: )
An error in argument length checking in JavaScript, leading to potential integer overflows or other bounds checking issues.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <45.5 | 45.5 |
<50 | 50 | |
<45.5 | 45.5 | |
Mozilla Firefox | <50.0 | |
Mozilla Firefox ESR | <45.5.0 | |
Mozilla Thunderbird | <45.5.0 | |
Debian Debian Linux | =8.0 | |
debian/firefox | 118.0.2-1 | |
debian/firefox-esr | 91.12.0esr-1~deb10u1 115.3.1esr-1~deb10u1 102.15.0esr-1~deb11u1 115.3.1esr-1~deb11u1 102.15.1esr-1~deb12u1 115.3.0esr-1~deb12u1 115.3.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2016-5297 is a vulnerability in JavaScript argument length checking that can lead to potential integer overflows or other bounds checking issues.
Mozilla Thunderbird up to version 45.5, Mozilla Firefox ESR up to version 45.5, and Mozilla Firefox up to version 50 are affected by CVE-2016-5297.
CVE-2016-5297 has a severity level of 7, which is considered high.
Apply the necessary updates/remedies provided by Mozilla for the affected software versions (Mozilla Thunderbird, Mozilla Firefox ESR, Mozilla Firefox).
You can find more information about CVE-2016-5297 in the references provided: [Link1](https://bugzilla.mozilla.org/show_bug.cgi?id=1303678), [Link2](https://www.mozilla.org/en-US/security/advisories/mfsa2016-93/), [Link3](https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/).