Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-0817

Опубликовано: 24 мар. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.

РелизСтатусПримечание
devel

released

37.0+build2-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [36.0.4+build1-0ubuntu0.14.04.1]]
lucid

ignored

end of life
precise

released

36.0.4+build1-0ubuntu0.12.04.1
trusty

released

36.0.4+build1-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [36.0.4+build1-0ubuntu0.14.04.1]
upstream

released

36.0.4
utopic

released

36.0.4+build1-0ubuntu0.14.10.1

Показывать по

EPSS

Процентиль: 88%
0.03906
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 10 лет назад

The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.

nvd
больше 10 лет назад

The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.

debian
больше 10 лет назад

The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ES ...

github
больше 3 лет назад

The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.

fstec
больше 10 лет назад

Уязвимость программного обеспечения SeaMonkey, позволяющая удаленному злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании

EPSS

Процентиль: 88%
0.03906
Низкий

6.8 Medium

CVSS2