Unrated severityNVD Advisory· Published Aug 16, 2015· Updated May 6, 2026
CVE-2015-4473
CVE-2015-4473
Description
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Affected products
60cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*range: <=39.0.3
- cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- osv-coords48 versionspkg:rpm/suse/firefox-gcc47&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP1-LTSSpkg:rpm/suse/firefox-gcc47&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP1-TERADATApkg:rpm/suse/firefox-gcc47&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP1-LTSSpkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP1-TERADATApkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3pkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3pkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/MozillaFirefox-branding-SLE&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/MozillaFirefox-branding-SLE&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/MozillaFirefox-branding-SLE&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP1-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP1-TERADATApkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP1-LTSSpkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP1-TERADATApkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP3pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 4.7.2_20130108-0.37.2+ 47 more
- (no CPE)range: < 4.7.2_20130108-0.37.2
- (no CPE)range: < 4.7.2_20130108-0.37.2
- (no CPE)range: < 4.7.2_20130108-0.37.2
- (no CPE)range: < 31.0-0.12.51
- (no CPE)range: < 31.0-0.12.51
- (no CPE)range: < 31.0-0.5.7.11
- (no CPE)range: < 31.0-0.5.7.11
- (no CPE)range: < 31.0-0.5.7.11
- (no CPE)range: < 31.0-0.12.51
- (no CPE)range: < 31.0-0.12.51
- (no CPE)range: < 31.0-0.12.51
- (no CPE)range: < 31.0-0.12.51
- (no CPE)range: < 31.0-0.12.51
- (no CPE)range: < 31.0-14.1
- (no CPE)range: < 31.0-14.1
- (no CPE)range: < 31.0-14.1
- (no CPE)range: < 38.2.1esr-19.3
- (no CPE)range: < 38.2.1esr-19.3
- (no CPE)range: < 38.2.1esr-45.1
- (no CPE)range: < 38.2.0esr-10.1
- (no CPE)range: < 38.2.0esr-10.1
- (no CPE)range: < 38.2.0esr-10.1
- (no CPE)range: < 38.2.1esr-19.3
- (no CPE)range: < 38.2.1esr-19.3
- (no CPE)range: < 38.2.1esr-19.3
- (no CPE)range: < 38.2.1esr-45.1
- (no CPE)range: < 38.2.1esr-19.3
- (no CPE)range: < 38.2.1esr-19.3
- (no CPE)range: < 38.2.1esr-45.1
- (no CPE)range: < 38.2.1esr-19.3
- (no CPE)range: < 38.2.1esr-19.3
- (no CPE)range: < 38.2.1esr-45.1
- (no CPE)range: < 3.19.2.0-0.16.1
- (no CPE)range: < 3.19.2.0-0.16.1
- (no CPE)range: < 3.19.2.0-26.2
- (no CPE)range: < 3.19.2.0-0.7.1
- (no CPE)range: < 3.19.2.0-0.7.1
- (no CPE)range: < 3.19.2.0-0.7.1
- (no CPE)range: < 3.19.2.0-0.16.1
- (no CPE)range: < 3.19.2.0-0.16.1
- (no CPE)range: < 3.19.2.0-0.16.1
- (no CPE)range: < 3.19.2.0-26.2
- (no CPE)range: < 3.19.2.0-0.16.1
- (no CPE)range: < 3.19.2.0-0.16.1
- (no CPE)range: < 3.19.2.0-26.2
- (no CPE)range: < 3.19.2.0-0.16.1
- (no CPE)range: < 3.19.2.0-0.16.1
- (no CPE)range: < 3.19.2.0-26.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
23- lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-updates/2015-08/msg00030.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-updates/2015-08/msg00031.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1586.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1682.htmlnvdThird Party Advisory
- www.debian.org/security/2015/dsa-3333nvdThird Party Advisory
- www.debian.org/security/2015/dsa-3410nvdThird Party Advisory
- www.mozilla.org/security/announce/2015/mfsa2015-79.htmlnvdVendor Advisory
- www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlnvdThird Party Advisory
- www.securitytracker.com/id/1033247nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1033372nvdThird Party AdvisoryVDB Entry
- bugzilla.mozilla.org/show_bug.cginvdIssue TrackingVendor Advisory
- bugzilla.mozilla.org/show_bug.cginvdIssue TrackingVendor Advisory
- bugzilla.mozilla.org/show_bug.cginvdIssue TrackingVendor Advisory
- security.gentoo.org/glsa/201605-06nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2702-1nvdBroken Link
- www.ubuntu.com/usn/USN-2702-2nvdBroken Link
- www.ubuntu.com/usn/USN-2702-3nvdBroken Link
- www.ubuntu.com/usn/USN-2712-1nvdBroken Link
News mentions
0No linked articles in our index yet.