Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-1962

Опубликовано: 08 мар. 2016
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5thunderbirdNot affected
Red Hat Enterprise Linux 6thunderbirdNot affected
Red Hat Enterprise Linux 7thunderbirdNot affected
Red Hat Enterprise Linux 5firefoxFixedRHSA-2016:037309.03.2016
Red Hat Enterprise Linux 6firefoxFixedRHSA-2016:037309.03.2016
Red Hat Enterprise Linux 7firefoxFixedRHSA-2016:037309.03.2016

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1315578Mozilla: Use-after-free when using multiple WebRTC data channels (MFSA 2016-25)

EPSS

Процентиль: 89%
0.04436
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 9 лет назад

Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.

CVSS3: 9.8
nvd
больше 9 лет назад

Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.

CVSS3: 9.8
debian
больше 9 лет назад

Use-after-free vulnerability in the mozilla::DataChannelConnection::Cl ...

CVSS3: 9.8
github
больше 3 лет назад

Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.

fstec
больше 9 лет назад

Уязвимость браузеров Firefox ESR и Firefox, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 89%
0.04436
Низкий

6.8 Medium

CVSS2