CVE-2015-4485

EUVD-2015-4505
Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
10 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 91%
Affected Products (NVD)
VendorProductVersion
mozillafirefox
𝑥
≤ 39.0.3
mozillafirefox
38.0
mozillafirefox
38.0.1
mozillafirefox
38.0.5
mozillafirefox
38.1.0
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
15.04
opensuseopensuse
13.1
opensuseopensuse
13.2
oraclesolaris
11.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libvpx
bookworm
1.12.0-1+deb12u3
fixed
bookworm (security)
1.12.0-1+deb12u3
fixed
bullseye
1.9.0-1+deb11u3
fixed
bullseye (security)
1.9.0-1+deb11u3
fixed
jessie
not-affected
sid
1.14.1-1
fixed
squeeze
not-affected
trixie
1.14.1-1
fixed
wheezy
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
firefox
precise
Fixed 40.0+build4-0ubuntu0.12.04.1
released
trusty
Fixed 40.0+build4-0ubuntu0.14.04.1
released
vivid
Fixed 40.0+build4-0ubuntu0.15.04.1
released
References