mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
118 lines
3.8 KiB
JSON
118 lines
3.8 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2016-2837",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-673",
|
|
"refsource" : "MISC",
|
|
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-673"
|
|
},
|
|
{
|
|
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-77.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-77.html"
|
|
},
|
|
{
|
|
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1274637",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1274637"
|
|
},
|
|
{
|
|
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
|
|
},
|
|
{
|
|
"name" : "DSA-3640",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2016/dsa-3640"
|
|
},
|
|
{
|
|
"name" : "GLSA-201701-15",
|
|
"refsource" : "GENTOO",
|
|
"url" : "https://security.gentoo.org/glsa/201701-15"
|
|
},
|
|
{
|
|
"name" : "RHSA-2016:1551",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1551.html"
|
|
},
|
|
{
|
|
"name" : "openSUSE-SU-2016:1964",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"
|
|
},
|
|
{
|
|
"name" : "openSUSE-SU-2016:2026",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"
|
|
},
|
|
{
|
|
"name" : "USN-3044-1",
|
|
"refsource" : "UBUNTU",
|
|
"url" : "http://www.ubuntu.com/usn/USN-3044-1"
|
|
},
|
|
{
|
|
"name" : "92258",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/92258"
|
|
},
|
|
{
|
|
"name" : "1036508",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://www.securitytracker.com/id/1036508"
|
|
}
|
|
]
|
|
}
|
|
}
|