Описание
Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 43.0+build1-0ubuntu1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [43.0+build1-0ubuntu0.14.04.1]] |
precise | released | 43.0+build1-0ubuntu0.12.04.1 |
trusty | released | 43.0+build1-0ubuntu0.14.04.1 |
trusty/esm | DNE | trusty was released [43.0+build1-0ubuntu0.14.04.1] |
upstream | released | 43.0 |
vivid | released | 43.0+build1-0ubuntu0.15.04.1 |
wily | released | 43.0+build1-0ubuntu0.15.10.1 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefo ...
Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
EPSS
7.5 High
CVSS2