CVE-2015-4495
critical-risk
Published 2015-08-08
The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.
Do I need to act?
!
71.6% chance of exploitation in next 30 days
EPSS score — higher than 28% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (20)
References (35)
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1581.html
Vendor Advisory
http://www.mozilla.org/security/announce/2015/mfsa2015-78.html
Broken Link
http://www.securityfocus.com/bid/76249
Broken Link
http://www.securitytracker.com/id/1033216
Third Party Advisory
http://www.ubuntu.com/usn/USN-2707-1
Issue Tracking
https://bugzilla.mozilla.org/show_bug.cgi?id=1178058
Issue Tracking
https://bugzilla.mozilla.org/show_bug.cgi?id=1179262
Third Party Advisory
https://security.gentoo.org/glsa/201512-10
and 15 more references
81
/ 100
critical-risk
Severity
30/34 · Critical
Exploitability
26/34 · High
Exposure
25/34 · High