Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-26961

Опубликовано: 09 дек. 2020
Источник: debian

Описание

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed83.0-1package
firefox-esrfixed78.5.0esr-1package
thunderbirdfixed1:78.5.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2020-50/#CVE-2020-26961

  • https://www.mozilla.org/en-US/security/advisories/mfsa2020-51/#CVE-2020-26961

  • https://www.mozilla.org/en-US/security/advisories/mfsa2020-52/#CVE-2020-26961

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 5 лет назад

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

CVSS3: 6.1
redhat
около 5 лет назад

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

CVSS3: 6.5
nvd
около 5 лет назад

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

github
больше 3 лет назад

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

oracle-oval
около 5 лет назад

ELSA-2020-5257: firefox security update (IMPORTANT)