Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Mozilla firefox Esr
|
Mon, 21 Oct 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:* |
MITRE
Status: PUBLISHED
Assigner: mozilla
Published: 2016-08-05T01:00:00
Updated: 2024-08-06T00:53:48.999Z
Reserved: 2016-06-03T00:00:00
Link: CVE-2016-5258
Vulnrichment
No data.
NVD
Status : Modified
Published: 2016-08-05T01:59:14.063
Modified: 2024-10-22T13:54:41.943
Link: CVE-2016-5258
Redhat