{"id":"CVE-2016-5284","details":"Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird \u003c 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.","modified":"2026-03-15T22:09:24.772393Z","published":"2016-09-22T22:59:18.973Z","related":["MGASA-2016-0329","MGASA-2017-0059","SUSE-SU-2016:2431-1","SUSE-SU-2016:2434-1","SUSE-SU-2016:2513-1","openSUSE-SU-2024:10071-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"},{"type":"WEB","url":"http://www.securitytracker.com/id/1036852"},{"type":"WEB","url":"http://www.securityfocus.com/bid/93049"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1912.html"},{"type":"ADVISORY","url":"http://seclists.org/dailydave/2016/q3/51"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3674"},{"type":"ADVISORY","url":"http://www.mozilla.org/security/announce/2016/mfsa2016-85.html"},{"type":"ADVISORY","url":"https://blog.mozilla.org/security/2016/09/16/update-on-add-on-pinning-vulnerability/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-15"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2016-86/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2016-88/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1303127"},{"type":"ARTICLE","url":"https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"48.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"45.0"}]},{"events":[{"introduced":"0"},{"last_affected":"45.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"45.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"45.1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"45.2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"45.3.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5284.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}]}