Use-after-free vulnerability in Mozilla Firefox prior to 43.0 and Firefox ESR 38.x prior to 38.5 allows remote malicious users to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox |
||
mozilla firefox esr 38.0.5 |
||
mozilla firefox esr 38.1.0 |
||
mozilla firefox esr 38.2.1 |
||
mozilla firefox esr 38.3.0 |
||
mozilla firefox esr 38.0 |
||
mozilla firefox esr 38.0.1 |
||
mozilla firefox esr 38.4.0 |
||
mozilla firefox esr 38.1.1 |
||
mozilla firefox esr 38.2.0 |
||
opensuse leap 42.1 |
||
opensuse opensuse 13.2 |
||
opensuse opensuse 13.1 |
||
fedoraproject fedora 23 |
||
fedoraproject fedora 22 |