When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html - Issue Tracking, Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html - Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0243 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0466 - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1586176 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202003-02 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202003-10 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202003-37 - Third Party Advisory | |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04 - Third Party Advisory, US Government Resource | |
References | () https://usn.ubuntu.com/4241-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4335-1/ - Third Party Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2019-36/ - Vendor Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2019-37/ - Vendor Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2019-38/ - Vendor Advisory |
Information
Published : 2020-01-08 20:15
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11745
Mitre link : CVE-2019-11745
CVE.ORG link : CVE-2019-11745
JSON object : View
Products Affected
mozilla
- thunderbird
- firefox_esr
- firefox
siemens
- ruggedcom_rox_rx5000
- ruggedcom_rox_rx1510_firmware
- ruggedcom_rox_rx1511
- ruggedcom_rox_rx1510
- ruggedcom_rox_rx1512
- ruggedcom_rox_rx1511_firmware
- ruggedcom_rox_rx1500_firmware
- ruggedcom_rox_rx1400_firmware
- ruggedcom_rox_rx1501
- ruggedcom_rox_rx1500
- ruggedcom_rox_rx1400
- ruggedcom_rox_rx1501_firmware
- ruggedcom_rox_mx5000
- ruggedcom_rox_rx1512_firmware
- ruggedcom_rox_rx5000_firmware
- ruggedcom_rox_mx5000_firmware
canonical
- ubuntu_linux
opensuse
- leap
redhat
- enterprise_linux_server_aus
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write