[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Use-after-free vulnerability in Mozilla Firefox and Firefox ESR by triggering attempted use of a data channel that has been closed by a WebRTC function (Mac OS X)

ID: oval:org.secpod.oval:def:32478Date: (C)2016-01-07   (M)2023-12-07
Class: VULNERABILITYFamily: macos




The host is installed with Mozilla Firefox before 43.0 or Firefox ESR 38.x before 38.5 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle data channel that has been closed by a WebRTC function. Successful exploitation allows remote attackers to execute arbitrary code.

Platform:
Apple Mac OS 14
Apple Mac OS 13
Apple Mac OS 12
Apple Mac OS 11
Apple Mac OS X 10.15
Apple Mac OS X 10.14
Apple Mac OS X 10.12
Apple Mac OS X 10.13
Apple Mac OS X 10.9
Apple Mac OS X 10.10
Apple Mac OS X 10.11
Apple Mac OS X Server 10.9
Apple Mac OS X Server 10.10
Apple Mac OS X Server 10.11
Product:
Mozilla Firefox
Mozilla Firefox ESR
Reference:
CVE-2015-7210
CVE    1
CVE-2015-7210
CPE    12
cpe:/a:mozilla:firefox_esr
cpe:/a:mozilla:firefox_esr:38.0
cpe:/a:mozilla:firefox:42.0
cpe:/a:mozilla:firefox_esr:38.1.1
...

© SecPod Technologies