Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | * | 42.0 (including) |
Red Hat Enterprise Linux 5 | RedHat | firefox-0:38.5.0-2.el5_11 | * |
Red Hat Enterprise Linux 6 | RedHat | firefox-0:38.5.0-2.el6_7 | * |
Red Hat Enterprise Linux 7 | RedHat | firefox-0:38.5.0-3.el7_2 | * |
Firefox | Ubuntu | devel | * |
Firefox | Ubuntu | precise | * |
Firefox | Ubuntu | trusty | * |
Firefox | Ubuntu | upstream | * |
Firefox | Ubuntu | vivid | * |
Firefox | Ubuntu | wily | * |