The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html | Issue Tracking Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html | Issue Tracking Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:0292 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:0295 | Third Party Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1584170 | Exploit Issue Tracking Vendor Advisory |
https://security.gentoo.org/glsa/202003-02 | Third Party Advisory |
https://security.gentoo.org/glsa/202003-10 | Third Party Advisory |
https://usn.ubuntu.com/4241-1/ | Third Party Advisory |
https://usn.ubuntu.com/4335-1/ | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2019-36/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2019-37/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2019-38/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mozilla
Published: 2020-01-08T21:14:57
Updated: 2020-04-29T02:07:15
Reserved: 2019-09-30T00:00:00
Link: CVE-2019-17005
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-01-08T22:15:11.653
Modified: 2022-04-08T14:31:09.397
Link: CVE-2019-17005
JSON object: View
Redhat Information
No data.
CWE