CVE-2015-4495 (CNNVD-201508-043)

HIGH 有利用代码
中文标题:
多款Mozilla产品PDF阅读器安全漏洞
英文标题:
The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS befo...
CVSS分数: 8.8
发布时间: 2015-08-08 00:00:00
漏洞类型: 信息泄露
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Mozilla Firefox、Firefox ESR和Firefox OS都是由美国Mozilla基金会开发。Firefox是一款开源Web浏览器;Firefox ESR是Firefox的一个延长支持版本;Firefox OS是一套基于Linux内核并应用于智能手机和平板电脑中的移动操作系统。 多款Mozilla产品中的PDF阅读器存在安全漏洞。远程攻击者可借助特制的JavaScript代码和本机调节器利用该漏洞绕过同源策略,读取任意文件或获取权限。以下产品及版本受到影响:Mozilla Firefox 39.0.3之前版本,Firefox ESR Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2之前38.x版本,Firefox OS 2.2之前版本。说明:该漏洞在2015年8月被广泛利用。

英文描述:

The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.

CWE类型:
CWE-346
标签:
local multiple Tantaryu MING OSVDB-125839
受影响产品
厂商 产品 版本 版本范围 平台 CPE
mozilla firefox * - - cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozilla firefox_os * - - cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*
oracle solaris 11.3 - - cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
canonical ubuntu_linux 12.04 - - cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
canonical ubuntu_linux 14.04 - - cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
canonical ubuntu_linux 15.04 - - cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 5.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 6.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 7.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_eus 6.7 - - cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
redhat enterprise_linux_eus 7.1 - - cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
redhat enterprise_linux_eus 7.2 - - cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
redhat enterprise_linux_eus 7.3 - - cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
redhat enterprise_linux_eus 7.4 - - cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
redhat enterprise_linux_eus 7.5 - - cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
redhat enterprise_linux_eus 7.6 - - cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
redhat enterprise_linux_eus 7.7 - - cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
redhat enterprise_linux_server 5.0 - - cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
redhat enterprise_linux_server 6.0 - - cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_server 7.0 - - cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 7.3 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 7.4 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 7.6 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 7.7 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
redhat enterprise_linux_server_tus 7.3 - - cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
redhat enterprise_linux_server_tus 7.6 - - cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
redhat enterprise_linux_server_tus 7.7 - - cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 5.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 6.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 7.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
suse linux_enterprise_debuginfo 11 - - cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp1:*:*:*:*:*:*
opensuse opensuse 13.1 - - cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
opensuse opensuse 13.2 - - cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
suse linux_enterprise_desktop 11 - - cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
suse linux_enterprise_desktop 12 - - cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
suse linux_enterprise_server 11 - - cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
suse linux_enterprise_server 12 - - cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
suse linux_enterprise_software_development_kit 11 - - cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
suse linux_enterprise_software_development_kit 12 - - cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_CONFIRM
cve.org
访问
SUSE-SU-2015:1379 vendor-advisory
cve.org
访问
SUSE-SU-2015:1380 vendor-advisory
cve.org
访问
76249 vdb-entry
cve.org
访问
37772 exploit
cve.org
访问
RHSA-2015:1581 vendor-advisory
cve.org
访问
GLSA-201512-10 vendor-advisory
cve.org
访问
openSUSE-SU-2015:1389 vendor-advisory
cve.org
访问
USN-2707-1 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
SUSE-SU-2015:1528 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
1033216 vdb-entry
cve.org
访问
SUSE-SU-2015:1449 vendor-advisory
cve.org
访问
openSUSE-SU-2015:1390 vendor-advisory
cve.org
访问
134c704f-9b21-4f2e-91b3-4a467353bcc0 OTHER
nvd.nist.gov
访问
ExploitDB EDB-37772 EXPLOIT
exploitdb
访问
Download Exploit EDB-37772 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2015-4495 ADVISORY
cve.org
访问
CVSS评分详情
3.1 (adp)
HIGH
8.8
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2015-08-08 00:00:00
修改时间:
2025-10-21 23:55:58
创建时间:
2025-11-11 15:34:04
更新时间:
2025-11-11 16:35:31
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2015-4495 2025-11-11 15:18:57 2025-11-11 07:34:04
NVD nvd_CVE-2015-4495 2025-11-11 14:54:51 2025-11-11 07:42:45
CNNVD cnnvd_CNNVD-201508-043 2025-11-11 15:09:35 2025-11-11 07:52:09
EXPLOITDB exploitdb_EDB-37772 2025-11-11 15:05:27 2025-11-11 08:35:31
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:35:31
references_count: 18 → 21; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 18 -> 21
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:52:09
vulnerability_type: 未提取 → 信息泄露; cnnvd_id: 未提取 → CNNVD-201508-043; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 信息泄露
  • cnnvd_id: 未提取 -> CNNVD-201508-043
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:45
affected_products_count: 0 → 39; references_count: 17 → 18; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 0 -> 39
  • references_count: 17 -> 18
  • data_sources: ['cve'] -> ['cve', 'nvd']