Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-11734

Опубликовано: 27 сент. 2019
Источник: debian

Описание

Mozilla developers and community members reported memory safety bugs present in Firefox 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed69.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/#CVE-2019-11734

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

Mozilla developers and community members reported memory safety bugs present in Firefox 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69.

CVSS3: 9.8
redhat
больше 6 лет назад

Mozilla developers and community members reported memory safety bugs present in Firefox 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69.

CVSS3: 9.8
nvd
больше 6 лет назад

Mozilla developers and community members reported memory safety bugs present in Firefox 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69.

github
больше 3 лет назад

Mozilla developers and community members reported memory safety bugs present in Firefox 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69.

CVSS3: 9.8
fstec
больше 6 лет назад

Уязвимость браузера Firefox, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность