{"id":"USN-2993-1","summary":"firefox vulnerabilities","details":"Christian Holler, Gary Kwong, Jesse Ruderman, Tyson Smith, Timothy Nikkel,\nSylvestre Ledru, Julian Seward, Olli Pettay, Karl Tomlinson, Christoph\nDiehl, Julian Hector, Jan de Mooij, Mats Palmgren, and Tooru Fujisawa\ndiscovered multiple memory safety issues in Firefox. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service via application\ncrash, or execute arbitrary code. (CVE-2016-2815, CVE-2016-2818)\n\nA buffer overflow was discovered when parsing HTML5 fragments in some\ncircumstances. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial of\nservice via application crash, or execute arbitrary code. (CVE-2016-2819)\n\nA use-after-free was discovered in contenteditable mode in some\ncircumstances. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial of\nservice via application crash, or execute arbitrary code. (CVE-2016-2821)\n\nJordi Chancel discovered a way to use a persistent menu within a \u003cselect\u003e\nelement and place this in an arbitrary location. If a user were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to spoof the addressbar contents. (CVE-2016-2822)\n\nArmin Razmdjou that the location.host property can be set to an arbitrary\nstring after creating an invalid data: URI. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to bypass some same-origin protections. (CVE-2016-2825)\n\nA use-after-free was discovered when processing WebGL content in some\ncircumstances. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial of\nservice via application crash, or execute arbitrary code. (CVE-2016-2828)\n\nTim McCormack discovered that the permissions notification can show the\nwrong icon when a page requests several permissions in quick succession.\nAn attacker could potentially exploit this by tricking the user in to\ngiving consent for access to the wrong resource. (CVE-2016-2829)\n\nIt was discovered that a pointerlock can be created in a fullscreen\nwindow without user consent in some circumstances, and this pointerlock\ncannot be cancelled without quitting Firefox. If a user were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service or conduct clickjacking attacks.\n(CVE-2016-2831)\n\nJohn Schoenick discovered that CSS pseudo-classes can leak information\nabout plugins that are installed but disabled. An attacker could\npotentially exploit this to fingerprint users. (CVE-2016-2832)\n\nMatt Wobensmith discovered that Content Security Policy (CSP) does not\nblock the loading of cross-domain Java applets when specified by policy.\nAn attacker could potentially exploit this to bypass CSP protections and\nconduct cross-site scripting (XSS) attacks. (CVE-2016-2833)\n\nIn addition, multiple unspecified security issues were discovered in NSS.\n(CVE-2016-2834)\n","modified":"2026-04-22T09:24:58.840170Z","published":"2016-06-09T15:13:22Z","related":["UBUNTU-CVE-2016-2815","UBUNTU-CVE-2016-2818","UBUNTU-CVE-2016-2819","UBUNTU-CVE-2016-2821","UBUNTU-CVE-2016-2822","UBUNTU-CVE-2016-2825","UBUNTU-CVE-2016-2828","UBUNTU-CVE-2016-2829","UBUNTU-CVE-2016-2831","UBUNTU-CVE-2016-2832","UBUNTU-CVE-2016-2833","UBUNTU-CVE-2016-2834"],"upstream":["CVE-2016-2815","CVE-2016-2818","CVE-2016-2819","CVE-2016-2821","CVE-2016-2822","CVE-2016-2825","CVE-2016-2828","CVE-2016-2829","CVE-2016-2831","CVE-2016-2832","CVE-2016-2833","CVE-2016-2834","UBUNTU-CVE-2016-2815","UBUNTU-CVE-2016-2818","UBUNTU-CVE-2016-2819","UBUNTU-CVE-2016-2821","UBUNTU-CVE-2016-2822","UBUNTU-CVE-2016-2825","UBUNTU-CVE-2016-2828","UBUNTU-CVE-2016-2829","UBUNTU-CVE-2016-2831","UBUNTU-CVE-2016-2832","UBUNTU-CVE-2016-2833","UBUNTU-CVE-2016-2834"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2993-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2815"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2818"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2819"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2821"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2822"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2825"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2828"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2829"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2831"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2832"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2833"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2834"}],"affected":[{"package":{"name":"firefox","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/firefox@47.0+build3-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"47.0+build3-0ubuntu0.14.04.1"}]}],"versions":["24.0+build1-0ubuntu1","25.0+build3-0ubuntu0.13.10.1","28.0~b2+build1-0ubuntu2","28.0+build1-0ubuntu1","28.0+build2-0ubuntu1","28.0+build2-0ubuntu2","29.0+build1-0ubuntu0.14.04.2","30.0+build1-0ubuntu0.14.04.3","31.0+build1-0ubuntu0.14.04.1","32.0+build1-0ubuntu0.14.04.1","32.0.3+build1-0ubuntu0.14.04.1","33.0+build2-0ubuntu0.14.04.1","34.0+build2-0ubuntu0.14.04.1","35.0+build3-0ubuntu0.14.04.2","35.0.1+build1-0ubuntu0.14.04.1","36.0+build2-0ubuntu0.14.04.4","36.0.1+build2-0ubuntu0.14.04.1","36.0.4+build1-0ubuntu0.14.04.1","37.0+build2-0ubuntu0.14.04.1","37.0.1+build1-0ubuntu0.14.04.1","37.0.2+build1-0ubuntu0.14.04.1","38.0+build3-0ubuntu0.14.04.1","39.0+build5-0ubuntu0.14.04.1","39.0.3+build2-0ubuntu0.14.04.1","40.0+build4-0ubuntu0.14.04.1","40.0+build4-0ubuntu0.14.04.4","40.0.3+build1-0ubuntu0.14.04.1","41.0+build3-0ubuntu0.14.04.1","41.0.1+build2-0ubuntu0.14.04.1","41.0.2+build2-0ubuntu0.14.04.1","42.0+build2-0ubuntu0.14.04.1","43.0+build1-0ubuntu0.14.04.1","43.0.4+build3-0ubuntu0.14.04.1","44.0+build3-0ubuntu0.14.04.1","44.0.1+build2-0ubuntu0.14.04.1","44.0.2+build1-0ubuntu0.14.04.1","45.0+build2-0ubuntu0.14.04.1","45.0.1+build1-0ubuntu0.14.04.2","45.0.2+build1-0ubuntu0.14.04.1","46.0+build5-0ubuntu0.14.04.2","46.0.1+build1-0ubuntu0.14.04.3"],"ecosystem_specific":{"binaries":[{"binary_name":"firefox","binary_version":"47.0+build3-0ubuntu0.14.04.1"},{"binary_name":"firefox-globalmenu","binary_version":"47.0+build3-0ubuntu0.14.04.1"},{"binary_name":"firefox-mozsymbols","binary_version":"47.0+build3-0ubuntu0.14.04.1"},{"binary_name":"firefox-testsuite","binary_version":"47.0+build3-0ubuntu0.14.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2993-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2815"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2818"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2819"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2821"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2822"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2825"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2828"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2829"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2831"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2832"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2833"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2834"}],"ecosystem":"Ubuntu:14.04:LTS"}}},{"package":{"name":"firefox","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/firefox@47.0+build3-0ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"47.0+build3-0ubuntu0.16.04.1"}]}],"versions":["41.0.2+build2-0ubuntu1","42.0+build2-0ubuntu1","44.0+build3-0ubuntu2","44.0.1+build1-0ubuntu1","44.0.2+build1-0ubuntu1","45.0+build2-0ubuntu1","45.0.1+build1-0ubuntu1","45.0.2+build1-0ubuntu1","46.0+build5-0ubuntu0.16.04.2","46.0.1+build1-0ubuntu0.16.04.2"],"ecosystem_specific":{"binaries":[{"binary_name":"firefox","binary_version":"47.0+build3-0ubuntu0.16.04.1"},{"binary_name":"firefox-globalmenu","binary_version":"47.0+build3-0ubuntu0.16.04.1"},{"binary_name":"firefox-mozsymbols","binary_version":"47.0+build3-0ubuntu0.16.04.1"},{"binary_name":"firefox-testsuite","binary_version":"47.0+build3-0ubuntu0.16.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2993-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2815"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2818"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2819"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2821"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2822"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2825"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2828"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2829"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2831"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2832"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2833"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2834"}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.5"}