Описание
When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 59.0+build5-0ubuntu0.17.10.1 |
| bionic | released | 59.0.1+build1-0ubuntu1 |
| devel | released | 59.0.1+build1-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [59.0+build5-0ubuntu0.14.04.1]] |
| precise/esm | DNE | |
| trusty | released | 59.0+build5-0ubuntu0.14.04.1 |
| trusty/esm | DNE | trusty was released [59.0+build5-0ubuntu0.14.04.1] |
| upstream | released | 59.0 |
| xenial | released | 59.0+build5-0ubuntu0.16.04.1 |
Показывать по
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.
When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.
When packets with a mismatched RTP payload type are sent in WebRTC con ...
When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.
Уязвимость реализации технологии передачи потоковых данных WebRTC браузеров Mozilla Firefox и Firefox-ESR, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3