Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2016:2195-1)
Summary:The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2016:2195-1 advisory.
The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2016:2195-1 advisory.

Vulnerability Insight:
MozillaFirefox was updated to 45.3.0 ESR to fix the following issues
* MFSA 2016-62/CVE-2016-2835/CVE-2016-2836 Miscellaneous memory safety
hazards (rv:48.0 / rv:45.3)
* MFSA 2016-63/CVE-2016-2830 Favicon network connection can persist when
page is closed
* MFSA 2016-64/CVE-2016-2838 Buffer overflow rendering SVG with
bidirectional content
* MFSA 2016-65/CVE-2016-2839 Cairo rendering crash due to memory
allocation issue with FFmpeg 0.10
* MFSA 2016-67/CVE-2016-5252 Stack underflow during 2D graphics rendering
* MFSA 2016-70/CVE-2016-5254 Use-after-free when using alt key and
toplevel menus
* MFSA 2016-72/CVE-2016-5258 Use-after-free in DTLS during WebRTC session
* MFSA 2016-73/CVE-2016-5259 Use-after-free in service workers with nested
sync events
* MFSA 2016-76/CVE-2016-5262 Scripts on marquee tag can execute in
sandboxed iframes
* MFSA 2016-77/CVE-2016-2837 Buffer overflow in ClearKey Content
Decryption Module (CDM) during video playback
* MFSA 2016-78/CVE-2016-5263 Type confusion in display transformation
* MFSA 2016-79/CVE-2016-5264 Use-after-free when applying SVG effects
* MFSA 2016-80/CVE-2016-5265 Same-origin policy violation using local HTML
file and saved shortcut file
* CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)
Also a temporary workaround was added:
- Temporarily bind Firefox to the first CPU as a hotfix for an apparent
race condition (bsc#989196, bsc#990628)

Affected Software/OS:
'MozillaFirefox' package(s) on SUSE OpenStack Cloud 5, SUSE Manager Proxy 2.1, SUSE Manager 2.1, SUSE Linux Enterprise Software Development Kit 11-SP4, SUSE Linux Enterprise Server 11-SP4, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Debuginfo 11-SP3

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-2830
BugTraq ID: 92261
Debian Security Information: DSA-3640 (Google Search)
RedHat Security Advisories: RHSA-2016:1551
SuSE Security Announcement: openSUSE-SU-2016:1964 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:2026 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2016-2835
Common Vulnerability Exposure (CVE) ID: CVE-2016-2836
RedHat Security Advisories: RHSA-2016:1809
Common Vulnerability Exposure (CVE) ID: CVE-2016-2837
BugTraq ID: 92258
Common Vulnerability Exposure (CVE) ID: CVE-2016-2838
Common Vulnerability Exposure (CVE) ID: CVE-2016-2839
Common Vulnerability Exposure (CVE) ID: CVE-2016-5252
Common Vulnerability Exposure (CVE) ID: CVE-2016-5254
Common Vulnerability Exposure (CVE) ID: CVE-2016-5258
Common Vulnerability Exposure (CVE) ID: CVE-2016-5259
Common Vulnerability Exposure (CVE) ID: CVE-2016-5262
Common Vulnerability Exposure (CVE) ID: CVE-2016-5263
Common Vulnerability Exposure (CVE) ID: CVE-2016-5264
Common Vulnerability Exposure (CVE) ID: CVE-2016-5265
Common Vulnerability Exposure (CVE) ID: CVE-2016-6354
Debian Security Information: DSA-3653 (Google Search)
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.