Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-6799
HistoryMar 02, 2020 - 12:00 a.m.

CVE-2020-6799

2020-03-0200:00:00
ubuntu.com
ubuntu.com
14

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

68.7%

Command line arguments could have been injected during Firefox invocation
as a shell handler for certain unsupported file types. This required
Firefox to be configured as the default handler for a given file type and
for a file downloaded to be opened in a third party application that
insufficiently sanitized URL data. In that situation, clicking a link in
the third party application could have been used to retrieve and execute
files whose location was supplied through command line arguments. Note:
This issue only affects Windows operating systems and when Firefox is
configured as the default handler for non-default filetypes. Other
operating systems are unaffected. This vulnerability affects Firefox < 73
and Firefox < ESR68.5.

Notes

Author Note
tyhicks mozjs contains a copy of the SpiderMonkey JavaScript engine

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

68.7%