Описание
By manipulating the text in an <input>
tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
The Mozilla Foundation Security Advisory describes this flaw as:
By manipulating the text in an <input>
tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash.
Отчет
Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | firefox | Out of support scope | ||
Red Hat Enterprise Linux 6 | thunderbird | Out of support scope | ||
Red Hat Enterprise Linux 7 | firefox | Fixed | RHSA-2024:3951 | 17.06.2024 |
Red Hat Enterprise Linux 7 | thunderbird | Fixed | RHSA-2024:4016 | 20.06.2024 |
Red Hat Enterprise Linux 8 | firefox | Fixed | RHSA-2024:3954 | 17.06.2024 |
Red Hat Enterprise Linux 8 | thunderbird | Fixed | RHSA-2024:4036 | 20.06.2024 |
Red Hat Enterprise Linux 8.2 Advanced Update Support | firefox | Fixed | RHSA-2024:3952 | 17.06.2024 |
Red Hat Enterprise Linux 8.2 Advanced Update Support | thunderbird | Fixed | RHSA-2024:4001 | 20.06.2024 |
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | firefox | Fixed | RHSA-2024:3953 | 17.06.2024 |
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | thunderbird | Fixed | RHSA-2024:4003 | 20.06.2024 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.1 Medium
CVSS3
Связанные уязвимости
By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
By manipulating the text in an `<input>` tag, an attacker could ...
By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
EPSS
6.1 Medium
CVSS3