10
CVSSv2

CVE-2016-1962

Published: 13/03/2016 Updated: 27/12/2019
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox prior to 45.0 and Firefox ESR 38.x prior to 38.7 allows remote malicious users to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox esr 38.3.0

mozilla firefox esr 38.2.1

mozilla firefox esr 38.6.0

mozilla firefox esr 38.5.1

mozilla firefox esr 38.0.5

mozilla firefox esr 38.0.1

mozilla firefox esr 38.5.0

mozilla firefox esr 38.4.0

mozilla firefox esr 38.0

mozilla firefox

mozilla firefox esr 38.6.1

mozilla firefox esr 38.2.0

mozilla firefox esr 38.1.1

mozilla firefox esr 38.1.0

opensuse opensuse 13.1

oracle linux 6

oracle linux 5.0

oracle linux 7

Vendor Advisories

Firefox could be made to crash or run programs as your login if it opened a malicious website ...
USN-2917-1 introduced several regressions in Firefox ...
USN-2917-1 introduced several regressions in Firefox ...
Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail client: Multiple memory safety errors, integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code or denial of service For the oldstable distribution (wheezy), these problems have been fixed in ...
Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, buffer overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, denial of service, address bar spoofing and overwriting local files For the oldstable distribution ...
Mozilla Foundation Security Advisory 2016-25 Use-after-free when using multiple WebRTC data channels Announced March 8, 2016 Reporter Dominique Hazaël-Massieux Impact Critical Products Firefox, Firefox ESR Fixed in ...
Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 450 and Firefox ESR 38x before 387 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections ...