Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-6825 (GCVE-0-2020-6825)
Vulnerability from cvelistv5 – Published: 2020-04-24 15:50 – Updated: 2024-08-04 09:11- Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7
| URL | Tags |
|---|---|
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_MISC |
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_MISC |
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_MISC |
| https://bugzilla.mozilla.org/buglist.cgi?bug_id=1… | x_refsource_MISC |
| https://usn.ubuntu.com/4335-1/ | vendor-advisoryx_refsource_UBUNTU |
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Thunderbird |
Affected:
unspecified , < 68.7.0
(custom)
|
|
| Mozilla | Firefox ESR |
Affected:
unspecified , < 68.7
(custom)
|
|
| Mozilla | Firefox |
Affected:
unspecified , < 75
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T09:11:05.021Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-13/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-12/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-14/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203"
},
{
"name": "USN-4335-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4335-1/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "68.7.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "68.7",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "75",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-04-29T02:06:57.000Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-13/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-12/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-14/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203"
},
{
"name": "USN-4335-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4335-1/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2020-6825",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "68.7.0"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "68.7"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "75"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2020-13/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2020-13/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2020-12/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2020-12/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2020-14/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2020-14/"
},
{
"name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203"
},
{
"name": "USN-4335-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4335-1/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2020-6825",
"datePublished": "2020-04-24T15:50:53.000Z",
"dateReserved": "2020-01-10T00:00:00.000Z",
"dateUpdated": "2024-08-04T09:11:05.021Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2020-6825",
"date": "2026-05-20",
"epss": "0.00701",
"percentile": "0.7222"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"75.0\", \"matchCriteriaId\": \"925D894A-1609-43FB-94FE-84B3EAB9CE72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"68.7.0\", \"matchCriteriaId\": \"D5D6475F-6C46-4BF0-B372-900A5B9FAED5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"68.7.0\", \"matchCriteriaId\": \"CF7AEB5A-A52E-45E7-AFBF-546C351A4915\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75.\"}, {\"lang\": \"es\", \"value\": \"Los desarrolladores y los miembros de la comunidad de Mozilla Tyson Smith y Christian Holler reportaron bugs de seguridad de memoria presentes en Firefox versi\\u00f3n 74 y Firefox ESR versi\\u00f3n 68.6. Algunos de estos bugs mostraron evidencia de corrupci\\u00f3n de memoria y presumimos que con suficiente esfuerzo algunos de estos podr\\u00edan haber sido explotados para ejecutar c\\u00f3digo arbitrario. Esta vulnerabilidad afecta a Thunderbird versiones anteriores a 68.7.0, Firefox ESR versiones anteriores a 68.7 y Firefox versiones anteriores a 75.\"}]",
"id": "CVE-2020-6825",
"lastModified": "2024-11-21T05:36:14.807",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-04-24T16:15:13.743",
"references": "[{\"url\": \"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203\", \"source\": \"security@mozilla.org\", \"tags\": [\"Issue Tracking\", \"Permissions Required\"]}, {\"url\": \"https://usn.ubuntu.com/4335-1/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2020-12/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2020-13/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2020-14/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Permissions Required\"]}, {\"url\": \"https://usn.ubuntu.com/4335-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2020-12/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2020-13/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2020-14/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-6825\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2020-04-24T16:15:13.743\",\"lastModified\":\"2024-11-21T05:36:14.807\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75.\"},{\"lang\":\"es\",\"value\":\"Los desarrolladores y los miembros de la comunidad de Mozilla Tyson Smith y Christian Holler reportaron bugs de seguridad de memoria presentes en Firefox versi\u00f3n 74 y Firefox ESR versi\u00f3n 68.6. Algunos de estos bugs mostraron evidencia de corrupci\u00f3n de memoria y presumimos que con suficiente esfuerzo algunos de estos podr\u00edan haber sido explotados para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Thunderbird versiones anteriores a 68.7.0, Firefox ESR versiones anteriores a 68.7 y Firefox versiones anteriores a 75.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"75.0\",\"matchCriteriaId\":\"925D894A-1609-43FB-94FE-84B3EAB9CE72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"68.7.0\",\"matchCriteriaId\":\"D5D6475F-6C46-4BF0-B372-900A5B9FAED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"68.7.0\",\"matchCriteriaId\":\"CF7AEB5A-A52E-45E7-AFBF-546C351A4915\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\"]},{\"url\":\"https://usn.ubuntu.com/4335-1/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2020-12/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2020-13/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2020-14/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\"]},{\"url\":\"https://usn.ubuntu.com/4335-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2020-12/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2020-13/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2020-14/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2020-AVI-196
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox versions ant\u00e9rieures \u00e0 75",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 68.7",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-6827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6827"
},
{
"name": "CVE-2020-6821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6821"
},
{
"name": "CVE-2020-6828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6828"
},
{
"name": "CVE-2020-6823",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6823"
},
{
"name": "CVE-2020-6824",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6824"
},
{
"name": "CVE-2020-6826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6826"
},
{
"name": "CVE-2020-6822",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6822"
},
{
"name": "CVE-2020-6825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6825"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-196",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-04-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2020-13 du 07 avril 2020",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-13/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2020-12 du 07 avril 2020",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/"
}
]
}
CERTFR-2020-AVI-204
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Mozilla Thunderbird versions antérieures à 68.7 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Thunderbird versions ant\u00e9rieures \u00e0 68.7",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-6821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6821"
},
{
"name": "CVE-2020-6819",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6819"
},
{
"name": "CVE-2020-6820",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6820"
},
{
"name": "CVE-2020-6822",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6822"
},
{
"name": "CVE-2020-6825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6825"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-204",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-04-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution\nde code arbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2020-14 du 09 avril 2020",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-14/"
}
]
}
CERTFR-2020-AVI-196
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox versions ant\u00e9rieures \u00e0 75",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 68.7",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-6827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6827"
},
{
"name": "CVE-2020-6821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6821"
},
{
"name": "CVE-2020-6828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6828"
},
{
"name": "CVE-2020-6823",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6823"
},
{
"name": "CVE-2020-6824",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6824"
},
{
"name": "CVE-2020-6826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6826"
},
{
"name": "CVE-2020-6822",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6822"
},
{
"name": "CVE-2020-6825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6825"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-196",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-04-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2020-13 du 07 avril 2020",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-13/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2020-12 du 07 avril 2020",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/"
}
]
}
CERTFR-2020-AVI-204
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Mozilla Thunderbird versions antérieures à 68.7 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Thunderbird versions ant\u00e9rieures \u00e0 68.7",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-6821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6821"
},
{
"name": "CVE-2020-6819",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6819"
},
{
"name": "CVE-2020-6820",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6820"
},
{
"name": "CVE-2020-6822",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6822"
},
{
"name": "CVE-2020-6825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6825"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-204",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-04-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution\nde code arbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2020-14 du 09 avril 2020",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-14/"
}
]
}
CNVD-2020-26234
Vulnerability from cnvd - Published: 2020-05-03厂商已发布了漏洞修复程序,请及时关注更新: https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/ https://www.mozilla.org/en-US/security/advisories/mfsa2020-13/ https://www.mozilla.org/en-US/security/advisories/mfsa2020-14/
| Name | ['Mozilla Firefox 74', 'Mozilla Firefox ESR 68.6', 'Mozilla Thunderbird <68.7.0'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-6825"
}
},
"description": "Mozilla Firefox\u7b49\u90fd\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4ea7\u54c1\u3002Mozilla Firefox\u662f\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002Mozilla Firefox ESR\u662fFirefox(Web\u6d4f\u89c8\u5668)\u7684\u4e00\u4e2a\u5ef6\u957f\u652f\u6301\u7248\u672c\u3002Mozilla Thunderbird\u662f\u4e00\u5957\u4eceMozilla Application Suite\u72ec\u7acb\u51fa\u6765\u7684\u7535\u5b50\u90ae\u4ef6\u5ba2\u6237\u7aef\u8f6f\u4ef6\u3002\n\n\u591a\u6b3eMozilla\u4ea7\u54c1\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u635f\u574f\u5185\u5b58\u6216\u53ef\u80fd\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2020-12/\r\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2020-13/\r\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2020-14/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-26234",
"openTime": "2020-05-03",
"patchDescription": "Mozilla Firefox\u7b49\u90fd\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4ea7\u54c1\u3002Mozilla Firefox\u662f\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002Mozilla Firefox ESR\u662fFirefox(Web\u6d4f\u89c8\u5668)\u7684\u4e00\u4e2a\u5ef6\u957f\u652f\u6301\u7248\u672c\u3002Mozilla Thunderbird\u662f\u4e00\u5957\u4eceMozilla Application Suite\u72ec\u7acb\u51fa\u6765\u7684\u7535\u5b50\u90ae\u4ef6\u5ba2\u6237\u7aef\u8f6f\u4ef6\u3002\r\n\r\n\u591a\u6b3eMozilla\u4ea7\u54c1\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u635f\u574f\u5185\u5b58\u6216\u53ef\u80fd\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eMozilla\u4ea7\u54c1\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2020-26234\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Mozilla Firefox 74",
"Mozilla Firefox ESR 68.6",
"Mozilla Thunderbird \u003c68.7.0"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-6825",
"serverity": "\u9ad8",
"submitTime": "2020-04-08",
"title": "\u591a\u6b3eMozilla\u4ea7\u54c1\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2020-26234\uff09"
}
FKIE_CVE-2020-6825
Vulnerability from fkie_nvd - Published: 2020-04-24 16:15 - Updated: 2024-11-21 05:36| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | firefox | * | |
| mozilla | firefox_esr | * | |
| mozilla | thunderbird | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "925D894A-1609-43FB-94FE-84B3EAB9CE72",
"versionEndExcluding": "75.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D6475F-6C46-4BF0-B372-900A5B9FAED5",
"versionEndExcluding": "68.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7AEB5A-A52E-45E7-AFBF-546C351A4915",
"versionEndExcluding": "68.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75."
},
{
"lang": "es",
"value": "Los desarrolladores y los miembros de la comunidad de Mozilla Tyson Smith y Christian Holler reportaron bugs de seguridad de memoria presentes en Firefox versi\u00f3n 74 y Firefox ESR versi\u00f3n 68.6. Algunos de estos bugs mostraron evidencia de corrupci\u00f3n de memoria y presumimos que con suficiente esfuerzo algunos de estos podr\u00edan haber sido explotados para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Thunderbird versiones anteriores a 68.7.0, Firefox ESR versiones anteriores a 68.7 y Firefox versiones anteriores a 75."
}
],
"id": "CVE-2020-6825",
"lastModified": "2024-11-21T05:36:14.807",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-04-24T16:15:13.743",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
],
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203"
},
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4335-1/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-12/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-13/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-14/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Permissions Required"
],
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4335-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-12/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-13/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-14/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-PJ8R-W3XR-J4W5
Vulnerability from github – Published: 2022-05-24 17:16 – Updated: 2022-05-24 17:16Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.7.0, Firefox ESR < 68.7, and Firefox < 75.
{
"affected": [],
"aliases": [
"CVE-2020-6825"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-04-24T16:15:00Z",
"severity": "HIGH"
},
"details": "Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75.",
"id": "GHSA-pj8r-w3xr-j4w5",
"modified": "2022-05-24T17:16:27Z",
"published": "2022-05-24T17:16:27Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6825"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4335-1"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2020-12"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2020-13"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2020-14"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2020-6825
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2020-6825",
"description": "Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75.",
"id": "GSD-2020-6825",
"references": [
"https://www.suse.com/security/cve/CVE-2020-6825.html",
"https://www.debian.org/security/2020/dsa-4656",
"https://www.debian.org/security/2020/dsa-4655",
"https://access.redhat.com/errata/RHSA-2020:1496",
"https://access.redhat.com/errata/RHSA-2020:1495",
"https://access.redhat.com/errata/RHSA-2020:1489",
"https://access.redhat.com/errata/RHSA-2020:1488",
"https://access.redhat.com/errata/RHSA-2020:1429",
"https://access.redhat.com/errata/RHSA-2020:1420",
"https://access.redhat.com/errata/RHSA-2020:1406",
"https://access.redhat.com/errata/RHSA-2020:1404",
"https://ubuntu.com/security/CVE-2020-6825",
"https://advisories.mageia.org/CVE-2020-6825.html",
"https://security.archlinux.org/CVE-2020-6825",
"https://linux.oracle.com/cve/CVE-2020-6825.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-6825"
],
"details": "Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75.",
"id": "GSD-2020-6825",
"modified": "2023-12-13T01:21:55.134993Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2020-6825",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "68.7.0"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "68.7"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "75"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2020-13/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2020-13/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2020-12/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2020-12/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2020-14/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2020-14/"
},
{
"name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203"
},
{
"name": "USN-4335-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4335-1/"
}
]
}
},
"mozilla.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2020-6825"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "68.7.0"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "75"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "68.7"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Mozilla developers Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox \u003c 75, and Firefox ESR \u003c 68.7."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Memory safety bugs fixed in Thunderbird 68.7.0"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2020-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2020-12/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2020-14/"
},
{
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "75.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "68.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "68.7.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2020-6825"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2020-13/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-13/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2020-14/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-14/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2020-12/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2020-12/"
},
{
"name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Permissions Required"
],
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203"
},
{
"name": "USN-4335-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4335-1/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-07-21T11:39Z",
"publishedDate": "2020-04-24T16:15Z"
}
}
}
OPENSUSE-SU-2020:0493-1
Vulnerability from csaf_opensuse - Published: 2020-04-10 06:55 - Updated: 2020-04-10 06:55| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for MozillaFirefox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:\n\n- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).\n- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).\n- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).\n- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).\n- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-493",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0493-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:0493-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PEPV5DHEVOPH4DSX3ID2NZZTDCDCRASS/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:0493-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PEPV5DHEVOPH4DSX3ID2NZZTDCDCRASS/"
},
{
"category": "self",
"summary": "SUSE Bug 1168874",
"url": "https://bugzilla.suse.com/1168874"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6821 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6822 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6825 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6825/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6827 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6827/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6828 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6828/"
}
],
"title": "Security update for MozillaFirefox",
"tracking": {
"current_release_date": "2020-04-10T06:55:38Z",
"generator": {
"date": "2020-04-10T06:55:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:0493-1",
"initial_release_date": "2020-04-10T06:55:38Z",
"revision_history": [
{
"date": "2020-04-10T06:55:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"product": {
"name": "MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"product_id": "MozillaFirefox-68.7.0-lp151.2.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"product": {
"name": "MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"product_id": "MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"product": {
"name": "MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"product_id": "MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"product": {
"name": "MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"product_id": "MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"product_id": "MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64",
"product_id": "MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-68.7.0-lp151.2.42.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64"
},
"product_reference": "MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64"
},
"product_reference": "MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64"
},
"product_reference": "MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64"
},
"product_reference": "MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-6821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6821"
}
],
"notes": [
{
"category": "general",
"text": "When reading from areas partially or fully outside the source resource with WebGL\u0027s \u003ccode\u003ecopyTexSubImage\u003c/code\u003e method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6821",
"url": "https://www.suse.com/security/cve/CVE-2020-6821"
},
{
"category": "external",
"summary": "SUSE Bug 1168630 for CVE-2020-6821",
"url": "https://bugzilla.suse.com/1168630"
},
{
"category": "external",
"summary": "SUSE Bug 1168874 for CVE-2020-6821",
"url": "https://bugzilla.suse.com/1168874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-10T06:55:38Z",
"details": "important"
}
],
"title": "CVE-2020-6821"
},
{
"cve": "CVE-2020-6822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6822"
}
],
"notes": [
{
"category": "general",
"text": "On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in \u003ccode\u003eGMPDecodeData\u003c/code\u003e. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6822",
"url": "https://www.suse.com/security/cve/CVE-2020-6822"
},
{
"category": "external",
"summary": "SUSE Bug 1168630 for CVE-2020-6822",
"url": "https://bugzilla.suse.com/1168630"
},
{
"category": "external",
"summary": "SUSE Bug 1168874 for CVE-2020-6822",
"url": "https://bugzilla.suse.com/1168874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-10T06:55:38Z",
"details": "important"
}
],
"title": "CVE-2020-6822"
},
{
"cve": "CVE-2020-6825",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6825"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6825",
"url": "https://www.suse.com/security/cve/CVE-2020-6825"
},
{
"category": "external",
"summary": "SUSE Bug 1168630 for CVE-2020-6825",
"url": "https://bugzilla.suse.com/1168630"
},
{
"category": "external",
"summary": "SUSE Bug 1168874 for CVE-2020-6825",
"url": "https://bugzilla.suse.com/1168874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-10T06:55:38Z",
"details": "important"
}
],
"title": "CVE-2020-6825"
},
{
"cve": "CVE-2020-6827",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6827"
}
],
"notes": [
{
"category": "general",
"text": "When following a link that opened an intent://-schemed URL, causing a custom tab to be opened, Firefox for Android could be tricked into displaying the incorrect URI. \u003cbr\u003e *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 68.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6827",
"url": "https://www.suse.com/security/cve/CVE-2020-6827"
},
{
"category": "external",
"summary": "SUSE Bug 1168874 for CVE-2020-6827",
"url": "https://bugzilla.suse.com/1168874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-10T06:55:38Z",
"details": "important"
}
],
"title": "CVE-2020-6827"
},
{
"cve": "CVE-2020-6828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6828"
}
],
"notes": [
{
"category": "general",
"text": "A malicious Android application could craft an Intent that would have been processed by Firefox for Android and potentially result in a file overwrite in the user\u0027s profile directory. One exploitation vector for this would be to supply a user.js file providing arbitrary malicious preference values. Control of arbitrary preferences can lead to sufficient compromise such that it is generally equivalent to arbitrary code execution.\u003cbr\u003e *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 68.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6828",
"url": "https://www.suse.com/security/cve/CVE-2020-6828"
},
{
"category": "external",
"summary": "SUSE Bug 1168874 for CVE-2020-6828",
"url": "https://bugzilla.suse.com/1168874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.7.0-lp151.2.42.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.7.0-lp151.2.42.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-10T06:55:38Z",
"details": "important"
}
],
"title": "CVE-2020-6828"
}
]
}
OPENSUSE-SU-2020:0520-1
Vulnerability from csaf_opensuse - Published: 2020-04-15 04:09 - Updated: 2020-04-15 04:09| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for MozillaThunderbird",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for MozillaThunderbird to version 68.7.0 fixes the following issues:\n\n- CVE-2020-6819: Use-after-free while running the nsDocShell destructor (boo#1168630)\n- CVE-2020-6820: Use-after-free when handling a ReadableStream (boo#1168630)\n- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage() (boo#1168874)\n- CVE-2020-6822: Out of bounds write in GMPDecodeData when processing large images (boo#1168874)\n- CVE-2020-6825: Memory safety bugs fixed (boo#1168874)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-520",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0520-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:0520-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FN6IIK5ALELZVRBAN75BE37AVPRLTHGY/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:0520-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FN6IIK5ALELZVRBAN75BE37AVPRLTHGY/"
},
{
"category": "self",
"summary": "SUSE Bug 1168630",
"url": "https://bugzilla.suse.com/1168630"
},
{
"category": "self",
"summary": "SUSE Bug 1168874",
"url": "https://bugzilla.suse.com/1168874"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6819 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6820 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6820/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6821 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6822 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6825 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6825/"
}
],
"title": "Security update for MozillaThunderbird",
"tracking": {
"current_release_date": "2020-04-15T04:09:36Z",
"generator": {
"date": "2020-04-15T04:09:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:0520-1",
"initial_release_date": "2020-04-15T04:09:36Z",
"revision_history": [
{
"date": "2020-04-15T04:09:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"product": {
"name": "MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"product_id": "MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"product_id": "MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64",
"product_id": "MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64"
},
"product_reference": "MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-6819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6819"
}
],
"notes": [
{
"category": "general",
"text": "Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox \u003c 74.0.1, and Firefox ESR \u003c 68.6.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6819",
"url": "https://www.suse.com/security/cve/CVE-2020-6819"
},
{
"category": "external",
"summary": "SUSE Bug 1168630 for CVE-2020-6819",
"url": "https://bugzilla.suse.com/1168630"
},
{
"category": "external",
"summary": "SUSE Bug 1168874 for CVE-2020-6819",
"url": "https://bugzilla.suse.com/1168874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-15T04:09:36Z",
"details": "important"
}
],
"title": "CVE-2020-6819"
},
{
"cve": "CVE-2020-6820",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6820"
}
],
"notes": [
{
"category": "general",
"text": "Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox \u003c 74.0.1, and Firefox ESR \u003c 68.6.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6820",
"url": "https://www.suse.com/security/cve/CVE-2020-6820"
},
{
"category": "external",
"summary": "SUSE Bug 1168630 for CVE-2020-6820",
"url": "https://bugzilla.suse.com/1168630"
},
{
"category": "external",
"summary": "SUSE Bug 1168874 for CVE-2020-6820",
"url": "https://bugzilla.suse.com/1168874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-15T04:09:36Z",
"details": "important"
}
],
"title": "CVE-2020-6820"
},
{
"cve": "CVE-2020-6821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6821"
}
],
"notes": [
{
"category": "general",
"text": "When reading from areas partially or fully outside the source resource with WebGL\u0027s \u003ccode\u003ecopyTexSubImage\u003c/code\u003e method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6821",
"url": "https://www.suse.com/security/cve/CVE-2020-6821"
},
{
"category": "external",
"summary": "SUSE Bug 1168630 for CVE-2020-6821",
"url": "https://bugzilla.suse.com/1168630"
},
{
"category": "external",
"summary": "SUSE Bug 1168874 for CVE-2020-6821",
"url": "https://bugzilla.suse.com/1168874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-15T04:09:36Z",
"details": "important"
}
],
"title": "CVE-2020-6821"
},
{
"cve": "CVE-2020-6822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6822"
}
],
"notes": [
{
"category": "general",
"text": "On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in \u003ccode\u003eGMPDecodeData\u003c/code\u003e. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6822",
"url": "https://www.suse.com/security/cve/CVE-2020-6822"
},
{
"category": "external",
"summary": "SUSE Bug 1168630 for CVE-2020-6822",
"url": "https://bugzilla.suse.com/1168630"
},
{
"category": "external",
"summary": "SUSE Bug 1168874 for CVE-2020-6822",
"url": "https://bugzilla.suse.com/1168874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-15T04:09:36Z",
"details": "important"
}
],
"title": "CVE-2020-6822"
},
{
"cve": "CVE-2020-6825",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6825"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.7.0, Firefox ESR \u003c 68.7, and Firefox \u003c 75.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6825",
"url": "https://www.suse.com/security/cve/CVE-2020-6825"
},
{
"category": "external",
"summary": "SUSE Bug 1168630 for CVE-2020-6825",
"url": "https://bugzilla.suse.com/1168630"
},
{
"category": "external",
"summary": "SUSE Bug 1168874 for CVE-2020-6825",
"url": "https://bugzilla.suse.com/1168874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.7.0-lp151.2.31.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.7.0-lp151.2.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-15T04:09:36Z",
"details": "important"
}
],
"title": "CVE-2020-6825"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.