6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
0.007 Low
EPSS
Percentile
80.9%
Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
Vendor | Product | Version | CPE |
---|---|---|---|
mozilla | firefox_esr | * | cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* |
mozilla | firefox | * | cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* |
[
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"status": "affected",
"version": "before 68.4"
}
]
},
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"status": "affected",
"version": "before 72"
}
]
}
]
lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html
lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html
packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html
access.redhat.com/errata/RHSA-2020:0085
access.redhat.com/errata/RHSA-2020:0086
access.redhat.com/errata/RHSA-2020:0111
access.redhat.com/errata/RHSA-2020:0120
access.redhat.com/errata/RHSA-2020:0123
access.redhat.com/errata/RHSA-2020:0127
access.redhat.com/errata/RHSA-2020:0292
access.redhat.com/errata/RHSA-2020:0295
bugzilla.mozilla.org/buglist.cgi?bug_id=1507180%2C1595470%2C1598605%2C1601826
lists.debian.org/debian-lts-announce/2020/01/msg00005.html
lists.debian.org/debian-lts-announce/2020/01/msg00016.html
seclists.org/bugtraq/2020/Jan/12
seclists.org/bugtraq/2020/Jan/18
seclists.org/bugtraq/2020/Jan/26
security.gentoo.org/glsa/202003-02
usn.ubuntu.com/4234-1/
usn.ubuntu.com/4241-1/
usn.ubuntu.com/4335-1/
www.debian.org/security/2020/dsa-4600
www.debian.org/security/2020/dsa-4603
www.mozilla.org/security/advisories/mfsa2020-01/
www.mozilla.org/security/advisories/mfsa2020-02/
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
0.007 Low
EPSS
Percentile
80.9%