Уязвимость утечки конфиденциальной информации из памяти процесса в реализации SVG Filters в Mozilla Firefox, Thunderbird и SeaMonkey
Описание
Уязвимость в реализации SVG Filters позволяет злоумышленникам получить доступ к конфиденциальной информации из памяти процесса. Это может быть достигнуто через использование методов, которые вызывают чтение данных за пределами допустимых границ памяти.
Затронутые версии ПО
- Mozilla Firefox до версии 3.6.28 и версии 4.x до 10.0
- Firefox ESR версии 10.x до 10.0.3
- Thunderbird до версии 3.1.20 и версии 5.0 до 10.0
- Thunderbird ESR версии 10.x до 10.0.3
- SeaMonkey до версии 2.8
Тип уязвимости
- Утечка конфиденциальной информации
Ссылки
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
EPSS
5 Medium
CVSS2
Дефекты
Связанные уязвимости
The SVG Filters implementation in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to obtain sensitive information from process memory via vectors that trigger an out-of-bounds read.
The SVG Filters implementation in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to obtain sensitive information from process memory via vectors that trigger an out-of-bounds read.
The SVG Filters implementation in Mozilla Firefox before 3.6.28 and 4. ...
The SVG Filters implementation in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to obtain sensitive information from process memory via vectors that trigger an out-of-bounds read.
EPSS
5 Medium
CVSS2