8.8
CVSSv3

CVE-2016-5259

Published: 05/08/2016 Updated: 27/12/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox prior to 48.0 and Firefox ESR 45.x prior to 45.3 allows remote malicious users to execute arbitrary code via a script that closes its own Service Worker within a nested sync event loop.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox esr 45.1.0

mozilla firefox

mozilla firefox esr 45.2.0

mozilla firefox esr 45.3.0

mozilla firefox esr 45.1.1

oracle linux 7

oracle linux 5.0

oracle linux 6

Vendor Advisories

Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Multiple security issues have been found in the Mozilla Firefox web browser: Multiple memory safety errors, buffer overflows and other implementation errors may lead to the execution of arbitrary code, cross-site scripting, information disclosure and bypass of the same-origin policy For the stable distribution (jessie), these problems have been fi ...
Mozilla Foundation Security Advisory 2016-73 Use-after-free in service workers with nested sync events Announced August 2, 2016 Reporter Looben Yang Impact Critical Products Firefox, Firefox ESR Fixed in ...
Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 480 and Firefox ESR 45x before 453 allows remote attackers to execute arbitrary code via a script that closes its own Service Worker within a nested sync event loop ...