Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-12422

Опубликовано: 09 июл. 2020
Источник: debian
EPSS Низкий

Описание

In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed78.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2020-24/#CVE-2020-12422

EPSS

Процентиль: 69%
0.00616
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 5 лет назад

In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.

CVSS3: 8.8
redhat
около 5 лет назад

In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.

CVSS3: 8.8
nvd
около 5 лет назад

In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.

CVSS3: 8.8
github
больше 3 лет назад

In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.

CVSS3: 8.8
fstec
около 5 лет назад

Уязвимость функции nsJPEGEncoder::emptyOutputBuffer () браузера Mozilla Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 69%
0.00616
Низкий