Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-40960

Опубликовано: 22 дек. 2022
Источник: debian

Описание

Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed105.0-1package
firefox-esrfixed102.3.0esr-1package
thunderbirdfixed1:102.3.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2022-40/#CVE-2022-40960

  • https://www.mozilla.org/en-US/security/advisories/mfsa2022-41/#CVE-2022-40960

  • https://www.mozilla.org/en-US/security/advisories/mfsa2022-42/#CVE-2022-40960

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 2 лет назад

Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.

CVSS3: 7.5
redhat
почти 3 года назад

Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.

CVSS3: 6.5
nvd
больше 2 лет назад

Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.

CVSS3: 6.5
github
больше 2 лет назад

Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.

CVSS3: 7.5
fstec
почти 3 года назад

Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании