{"id":"USN-2880-1","summary":"firefox vulnerabilities","details":"Bob Clary, Christian Holler, Nils Ohlmeier, Gary Kwong, Jesse Ruderman,\nCarsten Book, Randell Jesup, Nicolas Pierron, Eric Rescorla, Tyson Smith,\nand Gabor Krizsanits discovered multiple memory safety issues in Firefox.\nIf a user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit these to cause a denial of service via\napplication crash, or execute arbitrary code with the privileges of the\nuser invoking Firefox. (CVE-2016-1930, CVE-2016-1931)\n\nGustavo Grieco discovered an out-of-memory crash when loading GIF images\nin some circumstances. If a user were tricked in to opening a specially\ncrafted website, an attacker could exploit this to cause a denial of\nservice. (CVE-2016-1933)\n\nAki Helin discovered a buffer overflow when rendering WebGL content in\nsome circumstances. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this to cause a\ndenial of service via application crash, or execute arbitrary code with\nthe privileges of the user invoking Firefox. (CVE-2016-1935)\n\nIt was discovered that a delay was missing when focusing the protocol\nhandler dialog. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to conduct\nclickjacking attacks. (CVE-2016-1937)\n\nHanno Böck discovered that calculations with mp_div and mp_exptmod in NSS\nproduce incorrect results in some circumstances, resulting in\ncryptographic weaknesses. (CVE-2016-1938)\n\nNicholas Hurley discovered that Firefox allows for control characters to\nbe set in cookie names. An attacker could potentially exploit this to\nconduct cookie injection attacks on some web servers. (CVE-2016-1939)\n\nIt was discovered that when certain invalid URLs are pasted in to the\naddressbar, the addressbar contents may be manipulated to show the\nlocation of arbitrary websites. An attacker could potentially exploit this\nto conduct URL spoofing attacks. (CVE-2016-1942)\n\nRonald Crane discovered three vulnerabilities through code inspection. If\na user were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit these to cause a denial of service via\napplication crash, or execute arbitrary code with the privileges of the\nuser invoking Firefox. (CVE-2016-1944, CVE-2016-1945, CVE-2016-1946)\n\nFrançois Marier discovered that Application Reputation lookups didn't\nwork correctly, disabling warnings for potentially malicious downloads. An\nattacker could potentially exploit this by tricking a user in to\ndownloading a malicious file. Other parts of the Safe Browsing feature\nwere unaffected by this. (CVE-2016-1947)\n","modified":"2026-04-22T09:20:07.733944Z","published":"2016-01-27T15:31:47Z","related":["UBUNTU-CVE-2016-1930","UBUNTU-CVE-2016-1931","UBUNTU-CVE-2016-1933","UBUNTU-CVE-2016-1935","UBUNTU-CVE-2016-1937","UBUNTU-CVE-2016-1938","UBUNTU-CVE-2016-1939","UBUNTU-CVE-2016-1942","UBUNTU-CVE-2016-1944","UBUNTU-CVE-2016-1945","UBUNTU-CVE-2016-1946","UBUNTU-CVE-2016-1947"],"upstream":["CVE-2016-1930","CVE-2016-1931","CVE-2016-1933","CVE-2016-1935","CVE-2016-1937","CVE-2016-1938","CVE-2016-1939","CVE-2016-1942","CVE-2016-1944","CVE-2016-1945","CVE-2016-1946","CVE-2016-1947","UBUNTU-CVE-2016-1930","UBUNTU-CVE-2016-1931","UBUNTU-CVE-2016-1933","UBUNTU-CVE-2016-1935","UBUNTU-CVE-2016-1937","UBUNTU-CVE-2016-1938","UBUNTU-CVE-2016-1939","UBUNTU-CVE-2016-1942","UBUNTU-CVE-2016-1944","UBUNTU-CVE-2016-1945","UBUNTU-CVE-2016-1946","UBUNTU-CVE-2016-1947"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2880-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1930"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1931"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1933"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1935"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1937"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1938"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1939"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1942"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1944"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1945"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1946"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1947"}],"affected":[{"package":{"name":"firefox","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/firefox@44.0+build3-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"44.0+build3-0ubuntu0.14.04.1"}]}],"versions":["24.0+build1-0ubuntu1","25.0+build3-0ubuntu0.13.10.1","28.0~b2+build1-0ubuntu2","28.0+build1-0ubuntu1","28.0+build2-0ubuntu1","28.0+build2-0ubuntu2","29.0+build1-0ubuntu0.14.04.2","30.0+build1-0ubuntu0.14.04.3","31.0+build1-0ubuntu0.14.04.1","32.0+build1-0ubuntu0.14.04.1","32.0.3+build1-0ubuntu0.14.04.1","33.0+build2-0ubuntu0.14.04.1","34.0+build2-0ubuntu0.14.04.1","35.0+build3-0ubuntu0.14.04.2","35.0.1+build1-0ubuntu0.14.04.1","36.0+build2-0ubuntu0.14.04.4","36.0.1+build2-0ubuntu0.14.04.1","36.0.4+build1-0ubuntu0.14.04.1","37.0+build2-0ubuntu0.14.04.1","37.0.1+build1-0ubuntu0.14.04.1","37.0.2+build1-0ubuntu0.14.04.1","38.0+build3-0ubuntu0.14.04.1","39.0+build5-0ubuntu0.14.04.1","39.0.3+build2-0ubuntu0.14.04.1","40.0+build4-0ubuntu0.14.04.1","40.0+build4-0ubuntu0.14.04.4","40.0.3+build1-0ubuntu0.14.04.1","41.0+build3-0ubuntu0.14.04.1","41.0.1+build2-0ubuntu0.14.04.1","41.0.2+build2-0ubuntu0.14.04.1","42.0+build2-0ubuntu0.14.04.1","43.0+build1-0ubuntu0.14.04.1","43.0.4+build3-0ubuntu0.14.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"44.0+build3-0ubuntu0.14.04.1","binary_name":"firefox"},{"binary_version":"44.0+build3-0ubuntu0.14.04.1","binary_name":"firefox-globalmenu"},{"binary_version":"44.0+build3-0ubuntu0.14.04.1","binary_name":"firefox-mozsymbols"},{"binary_version":"44.0+build3-0ubuntu0.14.04.1","binary_name":"firefox-testsuite"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1930"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1931"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1933"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1935"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1937"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1938"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1939"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1942"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1944"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1945"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1946"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1947"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2880-1.json"}}],"schema_version":"1.7.5"}