Vulnerability Description
The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 39.0.3 |
| Mozilla | Firefox Os | < 2.2 |
| Oracle | Solaris | 11.3 |
| Canonical | Ubuntu Linux | 12.04 |
| Redhat | Enterprise Linux Desktop | 5.0 |
| Redhat | Enterprise Linux Eus | 6.7 |
| Redhat | Enterprise Linux Server | 5.0 |
| Redhat | Enterprise Linux Server Aus | 7.3 |
| Redhat | Enterprise Linux Server Tus | 7.3 |
| Redhat | Enterprise Linux Workstation | 5.0 |
| Suse | Linux Enterprise Debuginfo | 11 |
| Opensuse | Opensuse | 13.1 |
| Suse | Linux Enterprise Desktop | 11 |
| Suse | Linux Enterprise Server | 11 |
| Suse | Linux Enterprise Software Development Kit | 11 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-1581.htmlThird Party Advisory
- http://www.mozilla.org/security/announce/2015/mfsa2015-78.htmlVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlPatchThird Party Advisory
- http://www.securityfocus.com/bid/76249Broken LinkThird Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1033216Broken LinkThird Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-2707-1Third Party Advisory
- https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/Issue TrackingVendor Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=1178058Issue Tracking
- https://bugzilla.mozilla.org/show_bug.cgi?id=1179262Issue Tracking
FAQ
What is CVE-2015-4495?
CVE-2015-4495 is a vulnerability with a CVSS score of 8.8 (HIGH). The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain pr...
How severe is CVE-2015-4495?
CVE-2015-4495 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-4495?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Firefox Os, Oracle Solaris, Canonical Ubuntu Linux, Redhat Enterprise Linux Desktop.