Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 04:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2020:0085 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0086 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0111 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0120 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0123 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0127 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0292 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0295 - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507180%2C1595470%2C1598605%2C1601826 - Issue Tracking, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html - Mailing List, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2020/Jan/12 - Mailing List, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2020/Jan/18 - Mailing List, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2020/Jan/26 - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202003-02 - Third Party Advisory | |
References | () https://usn.ubuntu.com/4234-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4241-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4335-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2020/dsa-4600 - Third Party Advisory | |
References | () https://www.debian.org/security/2020/dsa-4603 - Third Party Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2020-01/ - Vendor Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2020-02/ - Vendor Advisory |
Information
Published : 2020-01-08 22:15
Updated : 2024-11-21 04:31
NVD link : CVE-2019-17024
Mitre link : CVE-2019-17024
CVE.ORG link : CVE-2019-17024
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- enterprise_linux_eus
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux
- enterprise_linux_server_aus
debian
- debian_linux
mozilla
- firefox
- firefox_esr
opensuse
- leap
canonical
- ubuntu_linux
CWE
CWE-787
Out-of-bounds Write