CVE-2016-5281

NameCVE-2016-5281
DescriptionUse-after-free vulnerability in the DOMSVGLength class in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-636-1, DSA-3674-1
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid57.0.1-1fixed
firefox-esr (PTS)wheezy (security)52.5.2esr-1~deb7u1fixed
jessie52.5.0esr-1~deb8u1fixed
jessie (security)52.5.2esr-1~deb8u1fixed
stretch52.5.0esr-1~deb9u1fixed
stretch (security)52.5.2esr-1~deb9u1fixed
buster52.5.0esr-1fixed
sid52.5.2esr-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)49.0-1high
firefox-esrsource(unstable)45.4.0esr-1high
firefox-esrsourcejessie45.4.0esr-1~deb8u2highDSA-3674-1
firefox-esrsourcewheezy45.4.0esr-1~deb7u1highDLA-636-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2016-86/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-87/

Search for package or bug name: Reporting problems