// For flags

CVE-2016-1960

Mozilla Firefox nsHtml5TreeBuilder Array Indexing Remote Code Execution Vulnerability

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.

Desbordamiento inferior de entero en la clase nsHtml5TreeBuilder en el intérprete de cadenas HTML5 en Mozilla Firefox en versiones anteriores a 45.0 y Firefox ESR 38.x en versiones anteriores a 38.7 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (uso después de liberación de memoria) mediante el aprovechamiento del manejo incorrecto de las etiquetas finales, según lo demostrado por el procesamiento incorrecto de SVG, también conocido como ZDI-CAN-3545.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of HTML5 end tags. The issue lies in the failure to check for an index becoming negative, allowing for out-of-bounds indexing. An attacker can leverage this vulnerability to execute code within the context of the current process.

*Credits: ca0nguyen
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-01-20 CVE Reserved
  • 2016-03-09 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • 2024-11-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (27)
URL Date SRC
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html 2019-12-27
http://www.debian.org/security/2016/dsa-3510 2019-12-27
http://www.debian.org/security/2016/dsa-3520 2019-12-27
http://www.mozilla.org/security/announce/2016/mfsa2016-23.html 2019-12-27
http://www.ubuntu.com/usn/USN-2917-1 2019-12-27
http://www.ubuntu.com/usn/USN-2917-2 2019-12-27
http://www.ubuntu.com/usn/USN-2917-3 2019-12-27
http://www.ubuntu.com/usn/USN-2934-1 2019-12-27
https://security.gentoo.org/glsa/201605-06 2019-12-27
https://access.redhat.com/security/cve/CVE-2016-1960 2016-03-16
https://bugzilla.redhat.com/show_bug.cgi?id=1315576 2016-03-16
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Linux
Search vendor "Oracle" for product "Linux"
5.0
Search vendor "Oracle" for product "Linux" and version "5.0"
-
Affected
Oracle
Search vendor "Oracle"
Linux
Search vendor "Oracle" for product "Linux"
6
Search vendor "Oracle" for product "Linux" and version "6"
-
Affected
Oracle
Search vendor "Oracle"
Linux
Search vendor "Oracle" for product "Linux"
7
Search vendor "Oracle" for product "Linux" and version "7"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 44.0.2
Search vendor "Mozilla" for product "Firefox" and version " <= 44.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.0.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.0.5
Search vendor "Mozilla" for product "Firefox Esr" and version "38.0.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.1.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.1.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.1.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.1.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.2.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.2.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.2.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.2.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.3.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.3.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.4.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.4.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.5.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.5.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.5.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.5.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.6.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.6.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.6.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.6.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
<= 38.6.0
Search vendor "Mozilla" for product "Thunderbird" and version " <= 38.6.0"
-
Affected
Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
42.1
Search vendor "Opensuse" for product "Leap" and version "42.1"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
13.1
Search vendor "Opensuse" for product "Opensuse" and version "13.1"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
13.2
Search vendor "Opensuse" for product "Opensuse" and version "13.2"
-
Affected
Suse
Search vendor "Suse"
Linux Enterprise
Search vendor "Suse" for product "Linux Enterprise"
12.0
Search vendor "Suse" for product "Linux Enterprise" and version "12.0"
-
Affected