Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
22 Oct 2024, 13:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:* |
21 Oct 2024, 13:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:* |
Information
Published : 2016-08-05 01:59
Updated : 2024-10-22 13:54
NVD link : CVE-2016-5258
Mitre link : CVE-2016-5258
CVE.ORG link : CVE-2016-5258
JSON object : View
Products Affected
mozilla
- firefox
oracle
- linux
CWE
CWE-416
Use After Free