Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-6822

Опубликовано: 24 апр. 2020
Источник: debian
EPSS Низкий

Описание

On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in <code>GMPDecodeData</code>. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.7.0, Firefox ESR < 68.7, and Firefox < 75.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed75.0-1package
firefox-esrfixed68.7.0esr-1package
thunderbirdfixed1:68.7.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2020-14/#CVE-2020-6822

  • https://www.mozilla.org/en-US/security/advisories/mfsa2020-13/#CVE-2020-6822

  • https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/#CVE-2020-6822

EPSS

Процентиль: 74%
0.00817
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 6 лет назад

On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in <code>GMPDecodeData</code>. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.7.0, Firefox ESR < 68.7, and Firefox < 75.

CVSS3: 8.8
redhat
почти 6 лет назад

On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in <code>GMPDecodeData</code>. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.7.0, Firefox ESR < 68.7, and Firefox < 75.

CVSS3: 8.8
nvd
почти 6 лет назад

On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in <code>GMPDecodeData</code>. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.7.0, Firefox ESR < 68.7, and Firefox < 75.

github
больше 3 лет назад

On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in <code>GMPDecodeData</code>. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.7.0, Firefox ESR < 68.7, and Firefox < 75.

CVSS3: 8.8
fstec
почти 6 лет назад

Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 74%
0.00817
Низкий