CVE-2016-5258

NameCVE-2016-5258
DescriptionUse-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-585-1, DSA-3640-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid56.0-2fixed
firefox-esr (PTS)wheezy (security)52.4.0esr-2~deb7u1fixed
jessie45.9.0esr-1~deb8u1fixed
jessie (security)52.4.0esr-1~deb8u1fixed
stretch (security), stretch52.4.0esr-1~deb9u1fixed
buster, sid52.4.0esr-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)48.0-1medium
firefox-esrsource(unstable)45.3.0esr-1medium
firefox-esrsourcejessie45.3.0esr-1~deb8u1mediumDSA-3640-1
firefox-esrsourcewheezy45.3.0esr-1~deb7u1mediumDLA-585-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2016-72/

Search for package or bug name: Reporting problems