[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Use-after-free vulnerability in Mozilla Firefox and Firefox ESR by triggering attempted use of a data channel that has been closed by a WebRTC function - MFSA2015-138 (Mac OS X)

ID: oval:org.secpod.oval:def:32458Date: (C)2016-01-07   (M)2023-12-07
Class: PATCHFamily: macos




The host is missing a security update according to Mozilla advisory, MFSA2015-138. The update is required to fix an use-after-free vulnerability. A flaw is present in the applications, which fail to handle data channel that has been closed by a WebRTC function. Successful exploitation allows remote attackers to execute arbitrary code.

Platform:
Apple Mac OS 14
Apple Mac OS 13
Apple Mac OS 12
Apple Mac OS 11
Apple Mac OS X 10.15
Apple Mac OS X 10.14
Apple Mac OS X 10.12
Apple Mac OS X 10.13
Apple Mac OS X 10.9
Apple Mac OS X 10.10
Apple Mac OS X 10.11
Apple Mac OS X Server 10.9
Apple Mac OS X Server 10.10
Apple Mac OS X Server 10.11
Product:
Mozilla Firefox ESR
Mozilla Firefox
Reference:
MFSA2015-138
CVE-2015-7210
CVE    1
CVE-2015-7210
CPE    12
cpe:/a:mozilla:firefox_esr
cpe:/a:mozilla:firefox_esr:38.0
cpe:/a:mozilla:firefox:42.0
cpe:/a:mozilla:firefox_esr:38.1.1
...

© SecPod Technologies