Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-34472

Опубликовано: 28 июн. 2022
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

If there was a PAC URL set and the server that hosts the PAC was not reachable, OCSP requests would have been blocked, resulting in incorrect error pages being shown. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.

A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue that if a PAC URL was set and the server that hosts the PAC was not reachable, OCSP requests are blocked, resulting in incorrect error pages being shown.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxOut of support scope
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7firefoxFixedRHSA-2022:547901.07.2022
Red Hat Enterprise Linux 7thunderbirdFixedRHSA-2022:548001.07.2022
Red Hat Enterprise Linux 8firefoxFixedRHSA-2022:546930.06.2022
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2022:547030.06.2022
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsfirefoxFixedRHSA-2022:547730.06.2022
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsthunderbirdFixedRHSA-2022:547830.06.2022
Red Hat Enterprise Linux 8.2 Extended Update SupportfirefoxFixedRHSA-2022:547401.07.2022
Red Hat Enterprise Linux 8.2 Extended Update SupportthunderbirdFixedRHSA-2022:547501.07.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-393
https://bugzilla.redhat.com/show_bug.cgi?id=2102166Mozilla: Unavailable PAC file resulted in OCSP requests being blocked

EPSS

Процентиль: 35%
0.00141
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
ubuntu
больше 2 лет назад

If there was a PAC URL set and the server that hosts the PAC was not reachable, OCSP requests would have been blocked, resulting in incorrect error pages being shown. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.

CVSS3: 4.3
nvd
больше 2 лет назад

If there was a PAC URL set and the server that hosts the PAC was not reachable, OCSP requests would have been blocked, resulting in incorrect error pages being shown. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.

CVSS3: 4.3
debian
больше 2 лет назад

If there was a PAC URL set and the server that hosts the PAC was not r ...

CVSS3: 4.3
github
больше 2 лет назад

If there was a PAC URL set and the server that hosts the PAC was not reachable, OCSP requests would have been blocked, resulting in incorrect error pages being shown. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.

CVSS3: 6.1
fstec
почти 3 года назад

Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, связанная с неправильной обработкой ошибок при обработке недоступного PAC-файла, позволяющая нарушителю задать URL-адрес PAC, и если сервер, на котором размещен PAC, недоступен, запросы OCSP блокируются, что приводит к отображению неверных страниц ошибок

EPSS

Процентиль: 35%
0.00141
Низкий

6.1 Medium

CVSS3

Уязвимость CVE-2022-34472