{"id":"CVE-2016-5252","details":"Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations.","modified":"2026-03-15T22:09:20.615853Z","published":"2016-08-05T01:59:09.767Z","related":["MGASA-2016-0278","SUSE-SU-2016:2061-1","SUSE-SU-2016:2131-1","SUSE-SU-2016:2195-1","openSUSE-SU-2016:2253-1","openSUSE-SU-2016:2254-1","openSUSE-SU-2024:10071-1","openSUSE-SU-2024:10230-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/92261"},{"type":"WEB","url":"http://www.securitytracker.com/id/1036508"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3640"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-15"},{"type":"ADVISORY","url":"http://www.mozilla.org/security/announce/2016/mfsa2016-67.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3044-1"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1268854"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6"}]},{"events":[{"introduced":"0"},{"last_affected":"7"}]},{"events":[{"introduced":"0"},{"last_affected":"47.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"45.1.0"}]},{"events":[{"introduced":"0"},{"last_affected":"45.1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"45.2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"45.3.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5252.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}