Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-26970

Опубликовано: 09 дек. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 9.3
CVSS3: 8.8

Описание

When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.

РелизСтатусПримечание
bionic

released

1:78.8.1+build1-0ubuntu0.18.04.1
devel

released

1:78.5.1+build1-0ubuntu1
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

released

1:78.7.1+build1-0ubuntu0.20.04.1
groovy

released

1:78.6.1+build1-0ubuntu0.20.10.1
hirsute

released

1:78.5.1+build1-0ubuntu1
impish

released

1:78.5.1+build1-0ubuntu1
jammy

released

1:78.5.1+build1-0ubuntu1
kinetic

released

1:78.5.1+build1-0ubuntu1

Показывать по

EPSS

Процентиль: 59%
0.00378
Низкий

9.3 Critical

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
redhat
около 5 лет назад

When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.

CVSS3: 8.8
nvd
около 5 лет назад

When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.

CVSS3: 8.8
debian
около 5 лет назад

When reading SMTP server status codes, Thunderbird writes an integer v ...

suse-cvrf
около 5 лет назад

Security update for MozillaThunderbird

github
больше 3 лет назад

When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.

EPSS

Процентиль: 59%
0.00378
Низкий

9.3 Critical

CVSS2

8.8 High

CVSS3