High severity8.8NVD Advisory· Published Mar 13, 2016· Updated May 6, 2026
CVE-2016-1954
CVE-2016-1954
Description
The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.
Affected products
22cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*+ 13 more
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*range: <=44.0.2
- cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
23- hg.mozilla.org/releases/mozilla-release/rev/5154bb929236nvdIssue TrackingPatch
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.htmlnvdThird Party Advisory
- www.mozilla.org/security/announce/2016/mfsa2016-17.htmlnvdVendor Advisory
- www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlnvdThird Party Advisory
- bugzilla.mozilla.org/show_bug.cginvdIssue Tracking
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.htmlnvd
- www.debian.org/security/2016/dsa-3510nvd
- www.debian.org/security/2016/dsa-3520nvd
- www.securitytracker.com/id/1035215nvd
- www.ubuntu.com/usn/USN-2917-1nvd
- www.ubuntu.com/usn/USN-2917-2nvd
- www.ubuntu.com/usn/USN-2917-3nvd
- www.ubuntu.com/usn/USN-2934-1nvd
- security.gentoo.org/glsa/201605-06nvd
News mentions
0No linked articles in our index yet.