Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-6831

Опубликовано: 26 мая 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

РелизСтатусПримечание
bionic

released

81.0.4044.138-0ubuntu0.18.04.1
devel

not-affected

code not present
eoan

not-affected

code not present
esm-apps/noble

not-affected

code not present
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal was not-affected [code not present]
focal

not-affected

code not present
groovy

not-affected

code not present
hirsute

not-affected

code not present
impish

not-affected

code not present

Показывать по

РелизСтатусПримечание
bionic

released

76.0+build2-0ubuntu0.18.04.1
devel

released

76.0+build2-0ubuntu1
eoan

released

76.0+build2-0ubuntu0.19.10.1
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

released

76.0+build2-0ubuntu0.20.04.1
groovy

released

76.0+build2-0ubuntu1
hirsute

released

76.0+build2-0ubuntu1
impish

released

76.0+build2-0ubuntu1
jammy

released

76.0+build2-0ubuntu1

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

DNE

esm-apps/bionic

ignored

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

ignored

end of life
esm-apps/focal

ignored

esm-infra-legacy/trusty

DNE

esm-infra/bionic

ignored

focal

ignored

groovy

ignored

end of life
hirsute

DNE

impish

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

ignored

end of life
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

ignored

focal

ignored

groovy

ignored

end of life
hirsute

DNE

impish

DNE

jammy

DNE

Показывать по

РелизСтатусПримечание
bionic

released

1:68.8.0+build2-0ubuntu0.18.04.2
devel

released

1:68.8.0+build2-0ubuntu1
eoan

released

1:68.8.0+build2-0ubuntu0.19.10.2
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

released

1:68.8.0+build2-0ubuntu0.20.04.2
groovy

released

1:68.8.0+build2-0ubuntu1
hirsute

released

1:68.8.0+build2-0ubuntu1
impish

released

1:68.8.0+build2-0ubuntu1
jammy

released

1:68.8.0+build2-0ubuntu1

Показывать по

EPSS

Процентиль: 91%
0.06267
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
redhat
почти 6 лет назад

A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

CVSS3: 9.8
nvd
больше 5 лет назад

A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

CVSS3: 9.8
debian
больше 5 лет назад

A buffer overflow could occur when parsing and validating SCTP chunks ...

github
больше 3 лет назад

A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

CVSS3: 9.8
fstec
больше 5 лет назад

Уязвимость механизма проверки фрагментов SCTP в WebRTC веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 91%
0.06267
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Уязвимость CVE-2020-6831