Files
CVEs-PoC/2016/CVE-2016-9066.md
T
2024-06-18 02:51:15 +02:00

22 lines
1.1 KiB
Markdown

### [CVE-2016-9066](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066)
![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2045.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2050%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Integer%20overflow%20leading%20to%20a%20buffer%20overflow%20in%20nsScriptLoadHandler&color=brighgreen)
### Description
A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
### POC
#### Reference
- https://bugzilla.mozilla.org/show_bug.cgi?id=1299686
#### Github
- https://github.com/ZihanYe/web-browser-vulnerabilities
- https://github.com/saelo/foxpwn