The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
22 Oct 2024, 13:42
Type | Values Removed | Values Added |
---|---|---|
CPE |
28 Jun 2024, 17:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 8.8 |
First Time |
Suse linux Enterprise Server
Suse linux Enterprise Desktop Suse linux Enterprise Software Development Kit Redhat enterprise Linux Server Tus Redhat enterprise Linux Desktop Suse linux Enterprise Debuginfo Redhat Redhat enterprise Linux Server Suse Redhat enterprise Linux Workstation Redhat enterprise Linux Server Aus Redhat enterprise Linux Eus |
|
CWE | NVD-CWE-noinfo | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html - Mailing List, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/76249 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1033216 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/ - Issue Tracking, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201512-10 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/37772/ - Exploit, Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:* cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.0.1:*:*:*:*:*:*:* cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp1:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:* |
Information
Published : 2015-08-08 00:59
Updated : 2024-10-22 13:42
NVD link : CVE-2015-4495
Mitre link : CVE-2015-4495
CVE.ORG link : CVE-2015-4495
JSON object : View
Products Affected
suse
- linux_enterprise_debuginfo
- linux_enterprise_server
- linux_enterprise_software_development_kit
- linux_enterprise_desktop
oracle
- solaris
redhat
- enterprise_linux_server_tus
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server
- enterprise_linux_eus
- enterprise_linux_desktop
opensuse
- opensuse
mozilla
- firefox
- firefox_os
canonical
- ubuntu_linux
CWE