Executive Summary
Summary | |
---|---|
Title | firefox-esr security update |
Informations | |||
---|---|---|---|
Name | DSA-3734 | First vendor Publication | 2016-12-14 |
Vendor | Debian | Last vendor Modification | 2016-12-14 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple security issues have been found in the Mozilla Firefox web browser: Multiple memory safety errors, buffer overflows and other implementation errors may lead to the execution of arbitrary code or information leaks. For the stable distribution (jessie), these problems have been fixed in version 45.6.0esr-1~deb8u1. For the unstable distribution (sid), these problems have been fixed in version 45.6.0esr-1 of firefox-esr and version 50.1.0-1 of firefox. We recommend that you upgrade your firefox-esr packages. |
Original Source
Url : http://www.debian.org/security/2016/dsa-3734 |
Alert History
Date | Informations |
---|---|
2016-12-16 13:24:42 |
|
2016-12-14 17:23:45 |
|