CVE-2019-17005

CVE Details

Release Date:2020-01-08
Impact:None What is this?

Description


The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.

See more information about CVE-2019-17005 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v3 metrics

Base Score: 8.8
Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Version: 3.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 6 (firefox)ELSA-2019-41082020-07-07
Oracle Linux version 6 (thunderbird)ELSA-2019-42052020-07-07
Oracle Linux version 7 (firefox)ELSA-2019-41072019-12-06
Oracle Linux version 7 (thunderbird)ELSA-2019-41482019-12-11
Oracle Linux version 8 (firefox)ELSA-2019-41112019-12-05
Oracle Linux version 8 (thunderbird)ELSA-2019-41952019-12-11


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete