Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-3302

Опубликовано: 16 апр. 2024
Источник: debian
EPSS Низкий

Описание

There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed125.0.1-1package
firefox-esrfixed115.10.0esr-1package
thunderbirdfixed1:115.10.1-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-18/#CVE-2024-3302

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-19/#CVE-2024-3302

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-20/#CVE-2024-3302

EPSS

Процентиль: 28%
0.00097
Низкий

Связанные уязвимости

CVSS3: 3.7
ubuntu
около 1 года назад

There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.

CVSS3: 3.7
redhat
около 1 года назад

There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.

CVSS3: 3.7
nvd
около 1 года назад

There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.

rocky
около 1 года назад

Low: thunderbird security update

rocky
около 1 года назад

Low: thunderbird security update

EPSS

Процентиль: 28%
0.00097
Низкий