Описание
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| chromium | fixed | 84.0.4147.89-1 | experimental | package |
| chromium | fixed | 87.0.4280.88-0.1 | package | |
| chromium | end-of-life | stretch | package | |
| firefox | fixed | 79.0-1 | package | |
| firefox-esr | fixed | 68.11.0esr-1 | package | |
| thunderbird | fixed | 1:68.11.0-1 | package |
Примечания
https://www.mozilla.org/en-US/security/advisories/mfsa2020-31/#CVE-2020-6514
https://www.mozilla.org/en-US/security/advisories/mfsa2020-32/#CVE-2020-6514
https://www.mozilla.org/en-US/security/advisories/mfsa2020-33/#CVE-2020-6514
https://www.mozilla.org/en-US/security/advisories/mfsa2020-35/#CVE-2020-6514
Связанные уязвимости
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
Уязвимость реализация WebRTC веб-браузеров Google Chrome, Firefox, Firefox-ESR и почтового клиента Thunderbird, связанная с переполнением буфера кучи, позволяющая нарушителю нарушить целостность данных