Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-6831

Опубликовано: 05 мая 2020
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

A flaw was found in Mozilla Firefox and Thunderbird. When parsing and validating SCTP chunks in WebRTC a memory buffer overflow could occur leading to memory corruption and an exploitable crash. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5firefoxOut of support scope
Red Hat Enterprise Linux 5thunderbirdOut of support scope
Red Hat Enterprise Linux 6firefoxFixedRHSA-2020:203606.05.2020
Red Hat Enterprise Linux 6thunderbirdFixedRHSA-2020:204911.05.2020
Red Hat Enterprise Linux 6 Supplementarychromium-browserFixedRHSA-2020:206411.05.2020
Red Hat Enterprise Linux 7firefoxFixedRHSA-2020:203706.05.2020
Red Hat Enterprise Linux 7thunderbirdFixedRHSA-2020:205011.05.2020
Red Hat Enterprise Linux 8firefoxFixedRHSA-2020:203106.05.2020
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2020:204611.05.2020
Red Hat Enterprise Linux 8.0 Update Services for SAP SolutionsfirefoxFixedRHSA-2020:203306.05.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=1831763usrsctp: Buffer overflow in AUTH chunk input validation

EPSS

Процентиль: 91%
0.06267
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

CVSS3: 9.8
nvd
больше 5 лет назад

A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

CVSS3: 9.8
debian
больше 5 лет назад

A buffer overflow could occur when parsing and validating SCTP chunks ...

github
больше 3 лет назад

A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

CVSS3: 9.8
fstec
больше 5 лет назад

Уязвимость механизма проверки фрагментов SCTP в WebRTC веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 91%
0.06267
Низкий

9.8 Critical

CVSS3