A STUN server in conjunction with a large number of "webkitRTCPeerConnection" objects can be used to send large STUN packets in a short period of time due to a lack of rate limiting being applied on e10s systems, allowing for a denial of service attack. This vulnerability affects Firefox < 51.
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1281482 | issue tracking vendor advisory |
http://www.securitytracker.com/id/1037693 | vdb entry third party advisory |
https://www.mozilla.org/security/advisories/mfsa2017-01/ | vendor advisory |
http://www.securityfocus.com/bid/95763 | vdb entry third party advisory |