Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-5696

Опубликовано: 11 июн. 2024
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

By manipulating the text in an &lt;input&gt; tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.

The Mozilla Foundation Security Advisory describes this flaw as: By manipulating the text in an <input> tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash.

Отчет

Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxOut of support scope
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7firefoxFixedRHSA-2024:395117.06.2024
Red Hat Enterprise Linux 7thunderbirdFixedRHSA-2024:401620.06.2024
Red Hat Enterprise Linux 8firefoxFixedRHSA-2024:395417.06.2024
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2024:403620.06.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportfirefoxFixedRHSA-2024:395217.06.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportthunderbirdFixedRHSA-2024:400120.06.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportfirefoxFixedRHSA-2024:395317.06.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportthunderbirdFixedRHSA-2024:400320.06.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1287
https://bugzilla.redhat.com/show_bug.cgi?id=2291400Mozilla: Memory Corruption in Text Fragments

EPSS

Процентиль: 81%
0.01645
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
около 1 года назад

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.

CVSS3: 8.6
nvd
около 1 года назад

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.

CVSS3: 8.6
debian
около 1 года назад

By manipulating the text in an `&lt;input&gt;` tag, an attacker could ...

CVSS3: 8.6
github
около 1 года назад

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 8.8
fstec
около 1 года назад

Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

EPSS

Процентиль: 81%
0.01645
Низкий

6.1 Medium

CVSS3