Уязвимость повреждения памяти при шифровании блочным шифром в Thunderbird и Firefox из-за некорректной обработки данных
Описание
При шифровании с использованием блочного шифра, если вызов NSC_EncryptUpdate происходит с данными, меньшими, чем размер блока, может происходить небольшая запись за пределами границ. Это приводит к повреждению кучи и потенциально эксплуатируемому аварийному завершению работы системы.
Затронутые версии ПО
- Thunderbird версий до 68.3
- Firefox ESR версий до 68.3
- Firefox версий до 71
Тип уязвимости
- Повреждение памяти
- Потенциально эксплуатируемое аварийное завершение работы
Ссылки
- Mailing ListThird Party Advisory
- Issue TrackingMailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Issue TrackingPatchVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party AdvisoryUS Government Resource
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Mailing ListThird Party Advisory
- Issue TrackingMailing ListThird Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
EPSS
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
Связанные уязвимости
When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
When encrypting with a block cipher, if a call to NSC_EncryptUpdate wa ...
When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
EPSS
8.8 High
CVSS3
6.8 Medium
CVSS2