Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2016-5258 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 6.8 |
---|---|
Base Metrics | AV:N/AC:M/Au:N/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
CVSS3 Base Score | 7.3 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity Impact | Low |
Availability Impact | Low |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (firefox) | RHSA-2016:1551 | 2016-08-03 |
Red Hat Enterprise Linux 7 (firefox) | RHSA-2016:1551 | 2016-08-03 |
Red Hat Enterprise Linux 5 (firefox) | RHSA-2016:1551 | 2016-08-03 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | thunderbird | Not affected |
Red Hat Enterprise Linux 6 | thunderbird | Not affected |
Red Hat Enterprise Linux 5 | thunderbird | Not affected |