Description
A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
Exploits (1)
References (9)
Core 9
Core References
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2016/dsa-3730
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1037298
Issue Tracking, Vendor Advisory x_refsource_confirm
https://bugzilla.mozilla.org/show_bug.cgi?id=1299686
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201701-15
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/94336
Vendor Advisory x_refsource_confirm
https://www.mozilla.org/security/advisories/mfsa2016-93/
Third Party Advisory vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-2780.html
Vendor Advisory x_refsource_confirm
https://www.mozilla.org/security/advisories/mfsa2016-89/
Vendor Advisory x_refsource_confirm
https://www.mozilla.org/security/advisories/mfsa2016-90/
Scores
CVSS v3
7.5
EPSS
0.2061
EPSS Percentile
95.6%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-119
Status
published
Products (3)
debian/debian_linux
8.0
mozilla/firefox
< 45.5.0
mozilla/thunderbird
< 45.5.0
Published
Jun 11, 2018
Tracked Since
Feb 18, 2026