Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-32213

Опубликовано: 02 июн. 2023
Источник: debian
EPSS Низкий

Описание

When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed113.0-1package
firefox-esrfixed102.11.0esr-1package
thunderbirdfixed1:102.11.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2023-16/#CVE-2023-32213

  • https://www.mozilla.org/en-US/security/advisories/mfsa2023-17/#CVE-2023-32213

  • https://www.mozilla.org/en-US/security/advisories/mfsa2023-18/#CVE-2023-32213

EPSS

Процентиль: 40%
0.00177
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 2 лет назад

When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.

CVSS3: 8.8
redhat
около 2 лет назад

When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.

CVSS3: 8.8
nvd
около 2 лет назад

When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.

CVSS3: 8.8
github
около 2 лет назад

When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.

CVSS3: 6.3
fstec
около 2 лет назад

Уязвимость функции FileReader::DoReadData() браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код в целевой системе

EPSS

Процентиль: 40%
0.00177
Низкий