CVE-2015-4495

NameCVE-2015-4495
DescriptionThe PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pdf.js (PTS)bullseye2.6.347+dfsg-3fixed
bookworm, sid, trixie2.14.305+dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
iceweaselsourcesqueeze(not affected)
iceweaselsourcewheezy(not affected)
iceweaselsourcejessie(not affected)
iceweaselsource(unstable)38.1.1esr-1
pdf.jssourcejessie1.0.907+dfsg-1+deb8u1
pdf.jssource(unstable)1.1.366+dfsg-1

Notes

[jessie] - iceweasel <not-affected> (Only affects 38.x ESR and 39)
[wheezy] - iceweasel <not-affected> (Only affects 38.x ESR and 39)
[squeeze] - iceweasel <not-affected> (Only affects 38.x ESR and 39)
https://www.mozilla.org/en-US/security/advisories/mfsa2015-78/
for jessie: xul-ext-pdf.js binary package build was removed
https://github.com/mozilla/pdf.js/commit/0b5330781c367fcbc997947adbf2bdcdf71f61bc
https://bugzilla.mozilla.org/show_bug.cgi?id=1179262

Search for package or bug name: Reporting problems