Описание
During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 56.0+build6-0ubuntu1 |
| bionic | released | 56.0+build6-0ubuntu1 |
| cosmic | released | 56.0+build6-0ubuntu1 |
| devel | released | 56.0+build6-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [56.0+build6-0ubuntu0.14.04.1]] |
| precise/esm | DNE | |
| trusty | released | 56.0+build6-0ubuntu0.14.04.1 |
| trusty/esm | DNE | trusty was released [56.0+build6-0ubuntu0.14.04.1] |
| upstream | released | 56.0 |
| vivid/ubuntu-core | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 2:3.32-1ubuntu3 |
| bionic | released | 2:3.32-1ubuntu3 |
| cosmic | released | 2:3.32-1ubuntu3 |
| devel | released | 2:3.32-1ubuntu3 |
| esm-infra-legacy/trusty | released | 2:3.28.4-0ubuntu0.14.04.3 |
| esm-infra/bionic | released | 2:3.32-1ubuntu3 |
| esm-infra/xenial | released | 2:3.28.4-0ubuntu0.16.04.3 |
| precise/esm | not-affected | 2:3.28.4-0ubuntu0.12.04.2 |
| trusty | released | 2:3.28.4-0ubuntu0.14.04.3 |
| trusty/esm | released | 2:3.28.4-0ubuntu0.14.04.3 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 1:52.4.0+build1-0ubuntu2 |
| bionic | released | 1:52.4.0+build1-0ubuntu2 |
| cosmic | released | 1:52.4.0+build1-0ubuntu2 |
| devel | released | 1:52.4.0+build1-0ubuntu2 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1:52.4.0+build1-0ubuntu0.14.04.2]] |
| precise/esm | DNE | |
| trusty | released | 1:52.4.0+build1-0ubuntu0.14.04.2 |
| trusty/esm | DNE | trusty was released [1:52.4.0+build1-0ubuntu0.14.04.2] |
| upstream | released | 52.4.0 |
| vivid/ubuntu-core | DNE |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
During TLS 1.2 exchanges, handshake hashes are generated which point t ...
During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3