Use-After-Free Vulnerability in Mozilla Firefox WebRTC Functionality
CVE-2016-5258

8.8HIGH

Key Information:

Vendor
Oracle
Status
Vendor
CVE Published:
5 August 2016

Summary

This vulnerability arises from a use-after-free condition in the WebRTC socket thread within Mozilla Firefox. Attackers can exploit this flaw by executing arbitrary code during the improper handling of DTLS objects when a WebRTC session is terminated. This could allow remote exploitation without user interaction, making it critical for users of affected versions to update promptly to safeguard against potential attacks.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.