Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox prior to 48.0 and Firefox ESR 45.x prior to 45.3 allows remote malicious users to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
oracle linux 6 |
||
oracle linux 7 |
||
oracle linux 5.0 |
||
mozilla firefox esr 45.3.0 |
||
mozilla firefox esr 45.1.1 |
||
mozilla firefox esr 45.2.0 |
||
mozilla firefox esr 45.1.0 |
||
mozilla firefox |