CVE-2020-26961

CVE Details

Release Date:2020-12-09

Description


When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

See more information about CVE-2020-26961 from MITRE CVE dictionary and NIST NVD


CVSS v3.0 metrics


NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.

Base Score: 6.5 Base Metrics: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Access Vector: Network Attack Complexity: Low
Privileges Required: None User Interaction: Required
Scope: Unchanged Confidentiality Impact: None
Integrity Impact: High Availability Impact: None

Errata information


PlatformErrataRelease Date
Oracle Linux version 6 (firefox)ELSA-2020-52572020-12-01
Oracle Linux version 6 (thunderbird)ELSA-2020-52382020-12-01
Oracle Linux version 7 (firefox)ELSA-2020-52392020-12-01
Oracle Linux version 7 (thunderbird)ELSA-2020-52352020-12-01
Oracle Linux version 8 (firefox)ELSA-2020-52372020-12-01
Oracle Linux version 8 (thunderbird)ELSA-2020-52362020-12-01



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete