During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1599005 | permissions required |
https://www.mozilla.org/security/advisories/mfsa2020-01/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2020-02/ | vendor advisory |
https://seclists.org/bugtraq/2020/Jan/18 | third party advisory mailing list |
http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html | |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html | vendor advisory |