Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-12421

Опубликовано: 30 июн. 2020
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.

The Mozilla Foundation Security Advisory describes this flaw as: When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5firefoxOut of support scope
Red Hat Enterprise Linux 5thunderbirdOut of support scope
Red Hat Enterprise Linux 6firefoxFixedRHSA-2020:282406.07.2020
Red Hat Enterprise Linux 6thunderbirdFixedRHSA-2020:296616.07.2020
Red Hat Enterprise Linux 7firefoxFixedRHSA-2020:282706.07.2020
Red Hat Enterprise Linux 7thunderbirdFixedRHSA-2020:290614.07.2020
Red Hat Enterprise Linux 8firefoxFixedRHSA-2020:282806.07.2020
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2020:303821.07.2020
Red Hat Enterprise Linux 8.0 Update Services for SAP SolutionsfirefoxFixedRHSA-2020:282506.07.2020
Red Hat Enterprise Linux 8.0 Update Services for SAP SolutionsthunderbirdFixedRHSA-2020:304621.07.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-296
https://bugzilla.redhat.com/show_bug.cgi?id=1853018Mozilla: Add-On updates did not respect the same certificate trust rules as software updates

EPSS

Процентиль: 81%
0.01493
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 5 лет назад

When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.

CVSS3: 6.5
nvd
больше 5 лет назад

When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.

CVSS3: 6.5
debian
больше 5 лет назад

When performing add-on updates, certificate chains terminating in non- ...

CVSS3: 6.5
github
больше 3 лет назад

When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.

CVSS3: 6.5
fstec
больше 5 лет назад

Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю отключить установленные надстройки

EPSS

Процентиль: 81%
0.01493
Низкий

6.1 Medium

CVSS3