Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "48.0.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "45.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "45.0.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "45.0.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "45.1.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "45.2.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "45.3.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5284.json"