Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-2712

Опубликовано: 14 мая 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.

РелизСтатусПримечание
devel

released

38.0+build3-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [38.0+build3-0ubuntu0.14.04.1]]
precise

released

38.0+build3-0ubuntu0.12.04.1
trusty

released

38.0+build3-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [38.0+build3-0ubuntu0.14.04.1]
upstream

released

38.0
utopic

released

38.0+build3-0ubuntu0.14.10.1
vivid

released

38.0+build3-0ubuntu0.15.04.1

Показывать по

EPSS

Процентиль: 88%
0.03878
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 10 лет назад

The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.

nvd
больше 10 лет назад

The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.

debian
больше 10 лет назад

The asm.js implementation in Mozilla Firefox before 38.0 does not prop ...

github
больше 3 лет назад

The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.

EPSS

Процентиль: 88%
0.03878
Низкий

7.5 High

CVSS2