7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.01 Low
EPSS
Percentile
84.0%
Severity: Critical
Date : 2020-11-02
CVE-ID : CVE-2020-15254 CVE-2020-15680 CVE-2020-15681 CVE-2020-15682
CVE-2020-15683 CVE-2020-15684 CVE-2020-15969
Package : firefox
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1256
The package firefox before version 82.0-1 is vulnerable to multiple
issues including arbitrary code execution, information disclosure and
content spoofing.
Upgrade to 82.0-1.
The problems have been fixed upstream in version 82.0.
None.
An undefined behaviour leading to memory corruption issues has been
found in the crossbeam rust crate <= 0.4.3. The βboundedβ channel
incorrectly assumes that βVec::from_iterβ has allocated enough capacity
for the number of iterator elements. βVec::from_iterβ does not actually
guarantee that and may allocate extra memory. The destructor of the
βboundedβ channel reconstructs βVecβ from the raw pointer based on the
incorrect assumptions described above. This is unsound and causing
deallocation with the incorrect capacity when the size allocated by
βVec::from_iterβ differs from the number of iterator elements.
An information disclosure issue has been found in Firefox before 82.0
where if a valid external protocol handler was referenced in an image
tag, the resulting broken image size could be distinguished from a
broken image size of a non-existent protocol handler. This allowed an
attacker to successfully probe whether an external protocol handler was
registered.
A memory corruption issue has been found in Firefox before 82.0 where,
when multiple WASM threads had a reference to a module, and were
looking up exported functions, one WASM thread could have overwritten
the entry of another thread in a shared stub table, resulting in a
potentially exploitable crash.
A spoofing issue has been found in Firefox before 82.0 where, when a
link to an external protocol was clicked, a prompt was presented that
allowed the user to choose what application to open it in. An attacker
could induce that prompt to be associated with an origin they didnβt
control, resulting in a spoofing attack. This was fixed by changing
external protocol prompts to be tab-modal while also ensuring they
could not be incorrectly associated with a different origin.
Several memory safety bugs have been found in Firefox before 82.0 and
Firefox ESR before 78.4. Some of these bugs showed evidence of memory
corruption and Mozilla presumes that with enough effort some of these
could have been exploited to run arbitrary code.
Several memory safety bugs have been found in Firefox before 82.0. Some
of these bugs showed evidence of memory corruption and Mozilla presumes
that with enough effort some of these could have been exploited to run
arbitrary code.
A use after free security issue has been found in the WebRTC component
of the chromium browser before 86.0.4240.75 and of Firefox before 82.0.
A remote attacker might be able to access sensitive information or
execute arbitrary code.
https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/
https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/#CVE-2020-15254
https://bugzilla.mozilla.org/show_bug.cgi?id=1668514
https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx
https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/#CVE-2020-15680
https://bugzilla.mozilla.org/show_bug.cgi?id=1658881
https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/#CVE-2020-15681
https://bugzilla.mozilla.org/show_bug.cgi?id=1666568
https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/#CVE-2020-15682
https://bugzilla.mozilla.org/show_bug.cgi?id=1636654
https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/#CVE-2020-15683
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1576843%2C1656987%2C1660954%2C1662760%2C1663439%2C1666140
https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/#CVE-2020-15684
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1653764%2C1661402%2C1662259%2C1664257
https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
https://crbug.com/1124659
https://security.archlinux.org/CVE-2020-15254
https://security.archlinux.org/CVE-2020-15680
https://security.archlinux.org/CVE-2020-15681
https://security.archlinux.org/CVE-2020-15682
https://security.archlinux.org/CVE-2020-15683
https://security.archlinux.org/CVE-2020-15684
https://security.archlinux.org/CVE-2020-15969
bugzilla.mozilla.org/buglist.cgi?bug_id=1576843%2C1656987%2C1660954%2C1662760%2C1663439%2C1666140
bugzilla.mozilla.org/buglist.cgi?bug_id=1653764%2C1661402%2C1662259%2C1664257
bugzilla.mozilla.org/show_bug.cgi?id=1636654
bugzilla.mozilla.org/show_bug.cgi?id=1658881
bugzilla.mozilla.org/show_bug.cgi?id=1666568
bugzilla.mozilla.org/show_bug.cgi?id=1668514
chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
crbug.com/1124659
github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx
security.archlinux.org/AVG-1256
security.archlinux.org/CVE-2020-15254
security.archlinux.org/CVE-2020-15680
security.archlinux.org/CVE-2020-15681
security.archlinux.org/CVE-2020-15682
security.archlinux.org/CVE-2020-15683
security.archlinux.org/CVE-2020-15684
security.archlinux.org/CVE-2020-15969
www.mozilla.org/en-US/security/advisories/mfsa2020-45/
www.mozilla.org/en-US/security/advisories/mfsa2020-45/#CVE-2020-15254
www.mozilla.org/en-US/security/advisories/mfsa2020-45/#CVE-2020-15680
www.mozilla.org/en-US/security/advisories/mfsa2020-45/#CVE-2020-15681
www.mozilla.org/en-US/security/advisories/mfsa2020-45/#CVE-2020-15682
www.mozilla.org/en-US/security/advisories/mfsa2020-45/#CVE-2020-15683
www.mozilla.org/en-US/security/advisories/mfsa2020-45/#CVE-2020-15684
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.01 Low
EPSS
Percentile
84.0%