CVE-2020-6800

Name
CVE-2020-6800
Description
Mozilla developers and community members reported memory safety bugs present in Firefox 72 and Firefox ESR 68.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. This vulnerability affects Thunderbird < 68.5, Firefox < 73, and Firefox < ESR68.5.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Broken Link https://bugzilla.mozilla.org/buglist.cgi?bug_id=1595786%2C1596706%2C1598543%2C1604851%2C1608580%2C1608785%2C1605777
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2020-06/
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2020-07/
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2020-05/
UBUNTU https://usn.ubuntu.com/4278-2/
GENTOO https://security.gentoo.org/glsa/202003-02
GENTOO https://security.gentoo.org/glsa/202003-10
UBUNTU https://usn.ubuntu.com/4328-1/
UBUNTU https://usn.ubuntu.com/4335-1/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* firefox >= None < 73.0
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* firefox_esr >= None < 68.5.0
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* thunderbird >= None < 68.5.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status