Executive Summary
Summary | |
---|---|
Title | Mozilla Thunderbird: Multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | GLSA-202003-10 | First vendor Publication | 2020-03-14 |
Vendor | Gentoo | Last vendor Modification | 2020-03-14 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 8.8 | ||
Base Score | 8.8 | Environmental Score | 8.8 |
impact SubScore | 5.9 | Temporal Score | 8.8 |
Exploitabality Sub Score | 2.8 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | Required |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Synopsis Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. Background Description Impact Workaround Resolution All Mozilla Thunderbird binary users should upgrade to the latest version: References Availability https://security.gentoo.org/glsa/202003-10 |
Original Source
Url : http://security.gentoo.org/glsa/glsa-202003-10.xml |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
27 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
15 % | CWE-416 | Use After Free |
12 % | CWE-362 | Race Condition |
8 % | CWE-125 | Out-of-bounds Read |
8 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
4 % | CWE-522 | Insufficiently Protected Credentials (CWE/SANS Top 25) |
4 % | CWE-476 | NULL Pointer Dereference |
4 % | CWE-459 | Incomplete Cleanup |
4 % | CWE-346 | Origin Validation Error |
4 % | CWE-312 | Cleartext Storage of Sensitive Information |
4 % | CWE-200 | Information Exposure |
4 % | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE/SANS Top 25) |
4 % | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Command Injection') |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2020-07-23 | Mozilla Firefox ReadableStreamCloseInternal out-of-bounds access attempt RuleID : 54380 - Revision : 1 - Type : BROWSER-FIREFOX |
2020-07-23 | Mozilla Firefox ReadableStreamCloseInternal out-of-bounds access attempt RuleID : 54379 - Revision : 1 - Type : BROWSER-FIREFOX |
Alert History
Date | Informations |
---|---|
2020-05-23 13:03:43 |
|
2020-03-14 17:18:26 |
|