Уязвимость в механизме распределения JIT-кода, позволяющая обойти защиту ASLR и DEP
Описание
Уязвимость в процессе распределения кода JIT (Just-In-Time) может позволить злоумышленнику обойти защиты ASLR (распределение адресного пространства) и DEP (предотвращение выполнения данных), что может привести к потенциальным атакам, связанным с повреждением памяти.
Затронутые версии ПО
- Thunderbird ниже версии 45.7
- Firefox ESR ниже версии 45.7
- Firefox ниже версии 51
Тип уязвимости
- Обход защитных механизмов
- Повреждение памяти
Ссылки
- Third Party Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Issue TrackingPermissions Required
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Issue TrackingPermissions Required
Уязвимые конфигурации
Одно из
Одно из
EPSS
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
Связанные уязвимости
JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
JIT code allocation can allow for a bypass of ASLR and DEP protections ...
JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
EPSS
9.8 Critical
CVSS3
7.5 High
CVSS2