Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.
https://security.gentoo.org/glsa/201701-15
https://bugzilla.mozilla.org/show_bug.cgi?id=1254721
http://www.ubuntu.com/usn/USN-2936-3
http://www.ubuntu.com/usn/USN-2936-2
http://www.ubuntu.com/usn/USN-2936-1
http://www.securitytracker.com/id/1035692
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.mozilla.org/security/announce/2016/mfsa2016-44.html
http://www.debian.org/security/2016/dsa-3559
http://rhn.redhat.com/errata/RHSA-2016-0695.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html