CVE-2016-5284

Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:45.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:45.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-09-22 22:59

Updated : 2024-02-28 15:21


NVD link : CVE-2016-5284

Mitre link : CVE-2016-5284

CVE.ORG link : CVE-2016-5284


JSON object : View

Products Affected

mozilla

  • firefox
  • firefox_esr
CWE
CWE-20

Improper Input Validation