CVE-2015-4503

high

Description

The TCP Socket API implementation in Mozilla Firefox before 41.0 mishandles array boundaries that were established with a navigator.mozTCPSocket.open method call and send method calls, which allows remote TCP servers to obtain sensitive information from process memory by reading packet data, as demonstrated by availability of this API in a Firefox OS application.

References

https://bugzilla.mozilla.org/show_bug.cgi?id=994337

http://www.securitytracker.com/id/1033640

http://www.securityfocus.com/bid/76815

http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

http://www.mozilla.org/security/announce/2015/mfsa2015-97.html

http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html

http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html

Details

Source: Mitre, NVD

Published: 2015-09-24

Updated: 2016-12-22

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: High