First published: Tue Nov 15 2016(Updated: )
A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <45.5 | 45.5 |
<50 | 50 | |
<45.5 | 45.5 | |
Mozilla Firefox | <50.0 | |
Mozilla Firefox ESR | <45.5.0 | |
Mozilla Thunderbird | <45.5.0 | |
Debian Debian Linux | =8.0 | |
debian/firefox | 118.0.2-1 | |
debian/firefox-esr | 91.12.0esr-1~deb10u1 115.3.1esr-1~deb10u1 102.15.0esr-1~deb11u1 115.3.1esr-1~deb11u1 102.15.1esr-1~deb12u1 115.3.0esr-1~deb12u1 115.3.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2016-9066 is a vulnerability that can cause a buffer overflow and potentially exploitable crash due to memory allocation issues in Thunderbird, Firefox ESR, and Firefox.
Thunderbird versions below 45.5, Firefox ESR versions below 45.5, and Firefox versions below 50 are affected by CVE-2016-9066.
CVE-2016-9066 has a severity value of 7, categorized as high.
CVE-2016-9066 occurs due to memory allocation issues when handling large amounts of incoming data, leading to a buffer overflow and potential crash.
To fix CVE-2016-9066, it is recommended to update Thunderbird to version 45.5 or newer, Firefox ESR to version 45.5 or newer, and Firefox to version 50 or newer.