The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Nov 2024, 02:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1581.html - Third Party Advisory | |
References | () http://www.mozilla.org/security/announce/2015/mfsa2015-78.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/76249 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1033216 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2707-1 - Third Party Advisory | |
References | () https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/ - Issue Tracking, Vendor Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1178058 - Issue Tracking | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1179262 - Issue Tracking | |
References | () https://security.gentoo.org/glsa/201512-10 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/37772/ - Exploit, Third Party Advisory, VDB Entry |
22 Oct 2024, 13:42
Type | Values Removed | Values Added |
---|---|---|
CPE |
28 Jun 2024, 17:23
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
First Time |
Suse linux Enterprise Desktop
Suse linux Enterprise Software Development Kit Suse linux Enterprise Server Redhat enterprise Linux Desktop Redhat enterprise Linux Server Aus Suse Redhat enterprise Linux Server Redhat enterprise Linux Eus Redhat enterprise Linux Server Tus Redhat Redhat enterprise Linux Workstation Suse linux Enterprise Debuginfo |
|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 8.8 |
CPE | cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.0.1:*:*:*:*:*:*:* cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:* |
cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:* |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html - Mailing List, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/76249 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1033216 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/ - Issue Tracking, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201512-10 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/37772/ - Exploit, Third Party Advisory, VDB Entry |
12 Sep 2023, 14:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:* |
Information
Published : 2015-08-08 00:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-4495
Mitre link : CVE-2015-4495
CVE.ORG link : CVE-2015-4495
JSON object : View
Products Affected
mozilla
- firefox_os
- firefox
oracle
- solaris
opensuse
- opensuse
redhat
- enterprise_linux_server_tus
- enterprise_linux_eus
- enterprise_linux_workstation
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_server_aus
suse
- linux_enterprise_software_development_kit
- linux_enterprise_desktop
- linux_enterprise_server
- linux_enterprise_debuginfo
canonical
- ubuntu_linux
CWE