Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1551.html - | |
References | () http://www.debian.org/security/2016/dsa-3640 - | |
References | () http://www.mozilla.org/security/announce/2016/mfsa2016-72.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/92258 - | |
References | () http://www.securitytracker.com/id/1036508 - | |
References | () http://www.ubuntu.com/usn/USN-3044-1 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1279146 - Exploit, Issue Tracking | |
References | () https://security.gentoo.org/glsa/201701-15 - |
22 Oct 2024, 13:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:* |
21 Oct 2024, 13:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:* |
Information
Published : 2016-08-05 01:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-5258
Mitre link : CVE-2016-5258
CVE.ORG link : CVE-2016-5258
JSON object : View
Products Affected
mozilla
- firefox
oracle
- linux
CWE
CWE-416
Use After Free