CVE-2016-5284 log

Source
Severity High
Remote Yes
Type Certificate verification bypass
Description
Due to flaws in the process used to update "Preloaded Public Key Pinning", the pinning for add-on updates became ineffective in early September. An attacker who was able to get a mis-issued certificate for a Mozilla web site could send malicious add-on updates to users on networks controlled by the attacker. Users who have not installed any add-ons are not affected.
Group Package Affected Fixed Severity Status Ticket
AVG-24 firefox 48.0.2-1 49.0-1 Critical Fixed
Date Advisory Group Package Severity Type
22 Sep 2016 ASA-201609-22 AVG-24 firefox Critical multiple issues
References
https://blog.mozilla.org/security/2016/09/16/update-on-add-on-pinning-vulnerability/
https://bugzilla.mozilla.org/show_bug.cgi?id=1303127