// For flags

CVE-2016-1960

Mozilla Firefox nsHtml5TreeBuilder Array Indexing Remote Code Execution Vulnerability

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

4
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.

Desbordamiento inferior de entero en la clase nsHtml5TreeBuilder en el intérprete de cadenas HTML5 en Mozilla Firefox en versiones anteriores a 45.0 y Firefox ESR 38.x en versiones anteriores a 38.7 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (uso después de liberación de memoria) mediante el aprovechamiento del manejo incorrecto de las etiquetas finales, según lo demostrado por el procesamiento incorrecto de SVG, también conocido como ZDI-CAN-3545.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of HTML5 end tags. The issue lies in the failure to check for an index becoming negative, allowing for out-of-bounds indexing. An attacker can leverage this vulnerability to execute code within the context of the current process.

Francis Gabriel discovered a buffer overflow during ASN.1 decoding in NSS. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. Bob Clary, Christoph Diehl, Christian Holler, Andrew McCreight, Daniel Holbert, Jesse Ruderman, Randell Jesup, Carsten Book, Gian-Carlo Pascutto, Tyson Smith, Andrea Marchesini, and Jukka Jylanki discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. Various other issues were also addressed.

*Credits: ca0nguyen
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-01-20 CVE Reserved
  • 2016-03-09 CVE Published
  • 2017-08-20 First Exploit
  • 2024-08-05 CVE Updated
  • 2025-03-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (29)
URL Date SRC
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html 2019-12-27
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html 2019-12-27
http://www.debian.org/security/2016/dsa-3510 2019-12-27
http://www.debian.org/security/2016/dsa-3520 2019-12-27
http://www.mozilla.org/security/announce/2016/mfsa2016-23.html 2019-12-27
http://www.ubuntu.com/usn/USN-2917-1 2019-12-27
http://www.ubuntu.com/usn/USN-2917-2 2019-12-27
http://www.ubuntu.com/usn/USN-2917-3 2019-12-27
http://www.ubuntu.com/usn/USN-2934-1 2019-12-27
https://security.gentoo.org/glsa/201605-06 2019-12-27
https://access.redhat.com/security/cve/CVE-2016-1960 2016-03-16
https://bugzilla.redhat.com/show_bug.cgi?id=1315576 2016-03-16
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Linux
Search vendor "Oracle" for product "Linux"
5.0
Search vendor "Oracle" for product "Linux" and version "5.0"
-
Affected
Oracle
Search vendor "Oracle"
Linux
Search vendor "Oracle" for product "Linux"
6
Search vendor "Oracle" for product "Linux" and version "6"
-
Affected
Oracle
Search vendor "Oracle"
Linux
Search vendor "Oracle" for product "Linux"
7
Search vendor "Oracle" for product "Linux" and version "7"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 44.0.2
Search vendor "Mozilla" for product "Firefox" and version " <= 44.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.0.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.0.5
Search vendor "Mozilla" for product "Firefox Esr" and version "38.0.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.1.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.1.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.1.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.1.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.2.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.2.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.2.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.2.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.3.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.3.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.4.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.4.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.5.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.5.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.5.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.5.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.6.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.6.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.6.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.6.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
<= 38.6.0
Search vendor "Mozilla" for product "Thunderbird" and version " <= 38.6.0"
-
Affected
Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
42.1
Search vendor "Opensuse" for product "Leap" and version "42.1"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
13.1
Search vendor "Opensuse" for product "Opensuse" and version "13.1"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
13.2
Search vendor "Opensuse" for product "Opensuse" and version "13.2"
-
Affected
Suse
Search vendor "Suse"
Linux Enterprise
Search vendor "Suse" for product "Linux Enterprise"
12.0
Search vendor "Suse" for product "Linux Enterprise" and version "12.0"
-
Affected