CVE-2016-5284

Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2016-1912.html
http://seclists.org/dailydave/2016/q3/51 Third Party Advisory
http://www.debian.org/security/2016/dsa-3674
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html Release Notes
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93049
http://www.securitytracker.com/id/1036852
https://blog.mozilla.org/security/2016/09/16/update-on-add-on-pinning-vulnerability/ Third Party Advisory VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=1303127 Issue Tracking Third Party Advisory VDB Entry
https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95 Technical Description
https://security.gentoo.org/glsa/201701-15
https://www.mozilla.org/security/advisories/mfsa2016-86/
https://www.mozilla.org/security/advisories/mfsa2016-88/
http://rhn.redhat.com/errata/RHSA-2016-1912.html
http://seclists.org/dailydave/2016/q3/51 Third Party Advisory
http://www.debian.org/security/2016/dsa-3674
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html Release Notes
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93049
http://www.securitytracker.com/id/1036852
https://blog.mozilla.org/security/2016/09/16/update-on-add-on-pinning-vulnerability/ Third Party Advisory VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=1303127 Issue Tracking Third Party Advisory VDB Entry
https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95 Technical Description
https://security.gentoo.org/glsa/201701-15
https://www.mozilla.org/security/advisories/mfsa2016-86/
https://www.mozilla.org/security/advisories/mfsa2016-88/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:53

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-1912.html - () http://rhn.redhat.com/errata/RHSA-2016-1912.html -
References () http://seclists.org/dailydave/2016/q3/51 - Third Party Advisory () http://seclists.org/dailydave/2016/q3/51 - Third Party Advisory
References () http://www.debian.org/security/2016/dsa-3674 - () http://www.debian.org/security/2016/dsa-3674 -
References () http://www.mozilla.org/security/announce/2016/mfsa2016-85.html - Release Notes () http://www.mozilla.org/security/announce/2016/mfsa2016-85.html - Release Notes
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html - () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html -
References () http://www.securityfocus.com/bid/93049 - () http://www.securityfocus.com/bid/93049 -
References () http://www.securitytracker.com/id/1036852 - () http://www.securitytracker.com/id/1036852 -
References () https://blog.mozilla.org/security/2016/09/16/update-on-add-on-pinning-vulnerability/ - Third Party Advisory, VDB Entry () https://blog.mozilla.org/security/2016/09/16/update-on-add-on-pinning-vulnerability/ - Third Party Advisory, VDB Entry
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1303127 - Issue Tracking, Third Party Advisory, VDB Entry () https://bugzilla.mozilla.org/show_bug.cgi?id=1303127 - Issue Tracking, Third Party Advisory, VDB Entry
References () https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95 - Technical Description () https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95 - Technical Description
References () https://security.gentoo.org/glsa/201701-15 - () https://security.gentoo.org/glsa/201701-15 -
References () https://www.mozilla.org/security/advisories/mfsa2016-86/ - () https://www.mozilla.org/security/advisories/mfsa2016-86/ -
References () https://www.mozilla.org/security/advisories/mfsa2016-88/ - () https://www.mozilla.org/security/advisories/mfsa2016-88/ -

21 Oct 2024, 13:55

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:firefox_esr:45.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:45.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*

21 Oct 2024, 13:11

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*

Information

Published : 2016-09-22 22:59

Updated : 2024-11-21 02:53


NVD link : CVE-2016-5284

Mitre link : CVE-2016-5284

CVE.ORG link : CVE-2016-5284


JSON object : View

Products Affected

mozilla

  • firefox
CWE
CWE-20

Improper Input Validation