7.5
CVSSv2

CVE-2015-7210

Published: 16/12/2015 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Use-after-free vulnerability in Mozilla Firefox prior to 43.0 and Firefox ESR 38.x prior to 38.5 allows remote malicious users to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

mozilla firefox esr 38.0.5

mozilla firefox esr 38.1.0

mozilla firefox esr 38.2.1

mozilla firefox esr 38.3.0

mozilla firefox esr 38.0

mozilla firefox esr 38.0.1

mozilla firefox esr 38.4.0

mozilla firefox esr 38.1.1

mozilla firefox esr 38.2.0

opensuse leap 42.1

opensuse opensuse 13.2

opensuse opensuse 13.1

fedoraproject fedora 23

fedoraproject fedora 22

Vendor Advisories

Synopsis Critical: firefox security update Type/Severity Security Advisory: Critical Topic Updated firefox packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 5, 6, and 7Red Hat Product Security has rated this update as having Critical securityimpact Common Vulnerabili ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Mozilla Foundation Security Advisory 2015-138 Use-after-free in WebRTC when datachannel is used after being destroyed Announced December 15, 2015 Reporter Looben Yang Impact Critical Products Firefox, Firefox ESR, Firefox OS ...
Use-after-free vulnerability in Mozilla Firefox before 430 and Firefox ESR 38x before 385 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function ...