First published: Fri Aug 05 2016(Updated: )
Last updated 24 July 2024
Credit: security@mozilla.org security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Linux | =5.0 | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
Mozilla Firefox | <=47.0.1 | |
Mozilla Firefox ESR | =45.1.0 | |
Mozilla Firefox ESR | =45.1.1 | |
Mozilla Firefox ESR | =45.2.0 | |
Mozilla Firefox ESR | =45.3.0 | |
Mozilla Firefox | =45.1.0 | |
Mozilla Firefox | =45.1.1 | |
Mozilla Firefox | =45.2.0 | |
Mozilla Firefox | =45.3.0 | |
debian/firefox | 133.0.3-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.5.0esr-1~deb11u1 128.3.1esr-1~deb12u1 128.5.0esr-1~deb12u1 128.5.0esr-1 128.5.1esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5258 is a use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3.
CVE-2016-5258 has a severity rating of 8.8 (high).
CVE-2016-5258 affects Oracle Linux 5.0, Oracle Linux 6, Oracle Linux 7, Mozilla Firefox up to version 47.0.1, and Mozilla Firefox ESR versions 45.1.0, 45.1.1, 45.2.0, and 45.3.0.
Remote attackers can exploit CVE-2016-5258 by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session to execute arbitrary code.
You can find more information about CVE-2016-5258 on the CVE Mitre website, Mozilla's security advisories page, and the Bugzilla entry.