CVE-2015-0817

Impact:
Critical
Public Date:
2015-03-21
CWE:
CWE-119
Bugzilla:
1204362: CVE-2015-0817 Mozilla: Code execution through incorrect JavaScript bounds checking elimination (MFSA 2015-29)

The MITRE CVE dictionary describes this issue as:

The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.

Find out more about CVE-2015-0817 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue does not affect the version of thunderbird package as shipped with Red Hat Enterprise Linux 5, 6 and 7.

CVSS v2 metrics

Base Score 6.8
Base Metrics AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (firefox) RHSA-2015:0718 2015-03-24
Red Hat Enterprise Linux 6 (firefox) RHSA-2015:0718 2015-03-24
Red Hat Enterprise Linux 5 (firefox) RHSA-2015:0718 2015-03-24

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 thunderbird Not affected
Red Hat Enterprise Linux 6 thunderbird Not affected
Red Hat Enterprise Linux 5 thunderbird Not affected

Acknowledgements

Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges ilxu1a as the original reporter.

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.