CVE-2016-5284
Mozilla: Add-on update site certificate pin expiration (MFSA 2016-85, MFSA 2016-86)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
Mozilla Firefox en versiones anteriores a la 49.0, Firefox ESR en versiones 45.x anteriores a la 45.4 y Thunderbird en versiones anteriores a la 45.4 confían en fechas de expiración erróneas para Preloaded Public Key Pinning, lo que permite a los atacantes Man-in-the-Middle (MitM) suplantar las actualizaciones de los add-ons aprovechando la posesión de un certificado de servidor X.509 para addons.mozilla.org firmado por una autoridad certificadora integrada arbitraria.
Atte Kettunen discovered an out-of-bounds read when handling certain Content Security Policy directives in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash. Christoph Diehl, Christian Holler, Gary Kwong, Nathan Froyd, Honza Bambas, Seth Fowler, Michael Smith, Andrew McCreight, Dan Minor, Byron Campen, Jon Coppeard, Steve Fink, Tyson Smith, and Carsten Book discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-06-03 CVE Reserved
- 2016-09-21 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://seclists.org/dailydave/2016/q3/51 | Mailing List |
|
http://www.mozilla.org/security/announce/2016/mfsa2016-85.html | Release Notes | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html | X_refsource_confirm |
|
http://www.securityfocus.com/bid/93049 | Vdb Entry | |
http://www.securitytracker.com/id/1036852 | Vdb Entry | |
https://blog.mozilla.org/security/2016/09/16/update-on-add-on-pinning-vulnerability | Third Party Advisory | |
https://bugzilla.mozilla.org/show_bug.cgi?id=1303127 | Issue Tracking | |
https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95 | Technical Description | |
https://www.mozilla.org/security/advisories/mfsa2016-86 | X_refsource_confirm | |
https://www.mozilla.org/security/advisories/mfsa2016-88 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2016-1912.html | 2018-10-30 | |
http://www.debian.org/security/2016/dsa-3674 | 2018-10-30 | |
https://security.gentoo.org/glsa/201701-15 | 2018-10-30 | |
https://access.redhat.com/security/cve/CVE-2016-5284 | 2016-09-21 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1377565 | 2016-09-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | <= 48.0.2 Search vendor "Mozilla" for product "Firefox" and version " <= 48.0.2" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 45.0.2 Search vendor "Mozilla" for product "Firefox" and version "45.0.2" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Esr Search vendor "Mozilla" for product "Firefox Esr" | 45.0 Search vendor "Mozilla" for product "Firefox Esr" and version "45.0" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Esr Search vendor "Mozilla" for product "Firefox Esr" | 45.0.1 Search vendor "Mozilla" for product "Firefox Esr" and version "45.0.1" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Esr Search vendor "Mozilla" for product "Firefox Esr" | 45.1.1 Search vendor "Mozilla" for product "Firefox Esr" and version "45.1.1" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Esr Search vendor "Mozilla" for product "Firefox Esr" | 45.2.0 Search vendor "Mozilla" for product "Firefox Esr" and version "45.2.0" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Esr Search vendor "Mozilla" for product "Firefox Esr" | 45.3.0 Search vendor "Mozilla" for product "Firefox Esr" and version "45.3.0" | - |
Affected
|