Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-11691

Опубликовано: 23 июл. 2019
Источник: debian
EPSS Низкий

Описание

A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed67.0-1experimentalpackage
firefoxfixed67.0-2package
firefox-esrfixed60.7.0esr-1package
thunderbirdfixed1:60.7.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11691

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-11691

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11691

EPSS

Процентиль: 66%
0.00516
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 6 лет назад

A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.

CVSS3: 9.8
redhat
около 6 лет назад

A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.

CVSS3: 9.8
nvd
около 6 лет назад

A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.

CVSS3: 9.8
github
около 3 лет назад

A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.

CVSS3: 9.8
fstec
около 6 лет назад

Уязвимость компонента API XMLHttpRequest браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании

EPSS

Процентиль: 66%
0.00516
Низкий