Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-28282

Опубликовано: 22 дек. 2022
Источник: debian

Описание

By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed99.0-1package
firefox-esrfixed91.8.0esr-1package
thunderbirdfixed1:91.8.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2022-13/#CVE-2022-28282

  • https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28282

  • https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28282

  • https://github.com/Pwnrin/CVE-2022-28282

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 2 лет назад

By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

CVSS3: 6.1
redhat
около 3 лет назад

By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

CVSS3: 6.5
nvd
больше 2 лет назад

By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

CVSS3: 6.5
github
больше 2 лет назад

By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

CVSS3: 6.1
fstec
около 3 лет назад

Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой освобождения памяти при обработке ссылок rel=&quot;localization&quot;, позволяющая нарушителю выполнить произвольный код