CVE-2016-5284

Summary

CVECVE-2016-5284
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2016-09-22 22:59:00 UTC
Updated2018-10-30 16:27:00 UTC
DescriptionMozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.

Risk And Classification

Problem Types: CWE-20

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Mozilla Firefox 45.0.2 All All All
Application Mozilla Firefox 45.0.2 All All All
Application Mozilla Firefox All All All All
Application Mozilla Firefox Esr 45.0 All All All
Application Mozilla Firefox Esr 45.0.1 All All All
Application Mozilla Firefox Esr 45.1.1 All All All
Application Mozilla Firefox Esr 45.2.0 All All All
Application Mozilla Firefox Esr 45.3.0 All All All
Application Mozilla Firefox Esr 45.0 All All All
Application Mozilla Firefox Esr 45.0.1 All All All
Application Mozilla Firefox Esr 45.1.1 All All All
Application Mozilla Firefox Esr 45.2.0 All All All
Application Mozilla Firefox Esr 45.3.0 All All All

References

ReferenceSourceLinkTags
Update on add-on pinning vulnerability | Mozilla Security Blog CONFIRM blog.mozilla.org Third Party Advisory, VDB Entry
Mozilla Firefox, Thunderbird: Multiple vulnerabilities (GLSA 201701-15) — Gentoo security GENTOO security.gentoo.org
Mozilla Firefox Multiple Security Vulnerabilities BID www.securityfocus.com
Oracle Linux Bulletin - October 2016 CONFIRM www.oracle.com
Security vulnerabilities fixed in Firefox 49 — Mozilla CONFIRM www.mozilla.org Release Notes
Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Bypass Security Restrictions, Determine File Paths, and Obtain Potentially Sensitive Information - SecurityTracker SECTRACK www.securitytracker.com
Dailydave: Deep down the certificate pinning rabbit hole of "Tor Browser Exposed" MLIST seclists.org Third Party Advisory
1303127 – (CVE-2016-5284) ESR-45/Tor Browser certificate pinning bypass for addons.mozilla.org and other built-in sites CONFIRM bugzilla.mozilla.org Issue Tracking, Third Party Advisory, VDB Entry
Tor Browser Exposed: Anti-Privacy Implantation at Mass Scale | Hacker Noon MISC hackernoon.com Technical Description
Debian -- Security Information -- DSA-3674-1 firefox-esr DEBIAN www.debian.org
Security vulnerabilities fixed in Thunderbird 45.4 — Mozilla CONFIRM www.mozilla.org
Red Hat Customer Portal REDHAT rhn.redhat.com
Security vulnerabilities fixed in Firefox ESR 45.4 — Mozilla CONFIRM www.mozilla.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 710500 Gentoo Linux Mozilla Firefox, Thunderbird Multiple Vulnerabilities (GLSA 201701-15)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report