8.8
CVSSv3

CVE-2016-5258

Published: 05/08/2016 Updated: 27/12/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox prior to 48.0 and Firefox ESR 45.x prior to 45.3 allows remote malicious users to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle linux 6

oracle linux 7

oracle linux 5.0

mozilla firefox esr 45.3.0

mozilla firefox esr 45.1.1

mozilla firefox esr 45.2.0

mozilla firefox esr 45.1.0

mozilla firefox

Vendor Advisories

Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Multiple security issues have been found in the Mozilla Firefox web browser: Multiple memory safety errors, buffer overflows and other implementation errors may lead to the execution of arbitrary code, cross-site scripting, information disclosure and bypass of the same-origin policy For the stable distribution (jessie), these problems have been fi ...
Mozilla Foundation Security Advisory 2016-72 Use-after-free in DTLS during WebRTC session shutdown Announced August 2, 2016 Reporter Looben Yang Impact Critical Products Firefox, Firefox ESR Fixed in ...
Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 480 and Firefox ESR 45x before 453 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session ...
Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 480 and Firefox ESR 45x before 453 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session ...