Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Firefox | Mozilla | * | 42.0 (including) |
| Red Hat Enterprise Linux 5 | RedHat | firefox-0:38.5.0-2.el5_11 | * |
| Red Hat Enterprise Linux 6 | RedHat | firefox-0:38.5.0-2.el6_7 | * |
| Red Hat Enterprise Linux 7 | RedHat | firefox-0:38.5.0-3.el7_2 | * |
| Firefox | Ubuntu | devel | * |
| Firefox | Ubuntu | precise | * |
| Firefox | Ubuntu | trusty | * |
| Firefox | Ubuntu | upstream | * |
| Firefox | Ubuntu | vivid | * |
| Firefox | Ubuntu | wily | * |