Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-6432

Опубликовано: 24 июн. 2025
Источник: redhat
CVSS3: 3.4

Описание

When Multi-Account Containers was enabled, DNS requests could have bypassed a SOCKS proxy when the domain name was invalid or the SOCKS proxy was not responding. This vulnerability affects Firefox < 140 and Thunderbird < 140.

Отчет

Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10firefoxNot affected
Red Hat Enterprise Linux 10rhel10/firefox-flatpakNot affected
Red Hat Enterprise Linux 6firefoxNot affected
Red Hat Enterprise Linux 7firefoxNot affected
Red Hat Enterprise Linux 8firefoxNot affected
Red Hat Enterprise Linux 9firefoxNot affected

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=2374556firefox: DNS Requests leaked outside of a configured SOCKS proxy

3.4 Low

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
4 месяца назад

When Multi-Account Containers was enabled, DNS requests could have bypassed a SOCKS proxy when the domain name was invalid or the SOCKS proxy was not responding. This vulnerability affects Firefox < 140 and Thunderbird < 140.

CVSS3: 8.6
nvd
4 месяца назад

When Multi-Account Containers was enabled, DNS requests could have bypassed a SOCKS proxy when the domain name was invalid or the SOCKS proxy was not responding. This vulnerability affects Firefox < 140 and Thunderbird < 140.

CVSS3: 8.6
debian
4 месяца назад

When Multi-Account Containers was enabled, DNS requests could have byp ...

CVSS3: 8.6
github
4 месяца назад

When Multi-Account Containers was enabled, DNS requests could have bypassed a SOCKS proxy when the domain name was invalid or the SOCKS proxy was not responding. This vulnerability affects Firefox < 140.

CVSS3: 8.6
fstec
4 месяца назад

Уязвимость функции Multi-Account Container браузера Mozilla Firefox, позволяющая нарушителю обойти существующие ограничения безопасности прокси-сервера SOCKS и раскрыть защищаемую информацию

3.4 Low

CVSS3