CVE-2020-6801
Published: 11 February 2020
Mozilla developers reported memory safety bugs present in Firefox 72. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 73.
Notes
Author | Note |
---|---|
tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
Priority
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
bionic |
Released
(73.0+build3-0ubuntu0.18.04.1)
|
eoan |
Released
(73.0+build3-0ubuntu0.19.10.1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(73.0)
|
|
xenial |
Released
(73.0.1+build1-0ubuntu0.16.04.1)
|
|
thunderbird Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
eoan |
Not vulnerable
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Not vulnerable
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |