Описание
In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | firefox | Out of support scope | ||
Red Hat Enterprise Linux 6 | firefox | Will not fix | ||
Red Hat Enterprise Linux 7 | firefox | Fixed | RHSA-2020:4080 | 30.09.2020 |
Red Hat Enterprise Linux 8 | firefox | Fixed | RHSA-2020:3557 | 26.08.2020 |
Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions | firefox | Fixed | RHSA-2020:3555 | 26.08.2020 |
Red Hat Enterprise Linux 8.1 Extended Update Support | firefox | Fixed | RHSA-2020:3559 | 26.08.2020 |
Показывать по
Дополнительная информация
Статус:
EPSS
8.8 High
CVSS3
Связанные уязвимости
In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.
In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.
In non-standard configurations, a JPEG image created by JavaScript cou ...
In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.
Уязвимость функции nsJPEGEncoder::emptyOutputBuffer () браузера Mozilla Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
EPSS
8.8 High
CVSS3