Release Date: | 2015-03-21 |
The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.
See more information about CVE-2015-0817 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.
Base Score: | 6.8 | Base Metrics: | AV:N/AC:M/Au:N/C:P/I:P/A:P |
Access Vector: | Network | Attack Complexity: | Medium |
Authentication: | None required | Confidentiality Impact: | Partial |
Integrity Impact: | Partial | Availability Impact: | Partial |
Platform | Errata | Release Date |
Oracle Linux version 5 (firefox) | ELSA-2015-0718 | 2015-03-24 |
Oracle Linux version 6 (firefox) | ELSA-2015-0718 | 2015-03-24 |
Oracle Linux version 7 (firefox) | ELSA-2015-0718 | 2015-03-24 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team