Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-5258

Опубликовано: 02 авг. 2016
Источник: redhat
CVSS3: 8.8
CVSS2: 6.8
EPSS Низкий

Описание

Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5thunderbirdNot affected
Red Hat Enterprise Linux 6thunderbirdNot affected
Red Hat Enterprise Linux 7thunderbirdNot affected
Red Hat Enterprise Linux 5firefoxFixedRHSA-2016:155103.08.2016
Red Hat Enterprise Linux 6firefoxFixedRHSA-2016:155103.08.2016
Red Hat Enterprise Linux 7firefoxFixedRHSA-2016:155103.08.2016

Показывать по

Дополнительная информация

Статус:

Critical
https://bugzilla.redhat.com/show_bug.cgi?id=1361982Mozilla: Use-after-free in DTLS during WebRTC session shutdown (MFSA 2016-72)

EPSS

Процентиль: 77%
0.01059
Низкий

8.8 High

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 9 лет назад

Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.

CVSS3: 8.8
nvd
около 9 лет назад

Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.

CVSS3: 8.8
debian
около 9 лет назад

Use-after-free vulnerability in the WebRTC socket thread in Mozilla Fi ...

CVSS3: 8.8
github
больше 3 лет назад

Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.

fstec
около 9 лет назад

Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 77%
0.01059
Низкий

8.8 High

CVSS3

6.8 Medium

CVSS2