When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.
NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.
|Base Score:||6.5||Base Metrics:||AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N|
|Access Vector:||Network||Attack Complexity:||Low|
|Privileges Required:||None||User Interaction:||Required|
|Integrity Impact:||High||Availability Impact:||None|
|Oracle Linux version 6 (firefox)||ELSA-2020-5257||2020-12-01|
|Oracle Linux version 6 (thunderbird)||ELSA-2020-5238||2020-12-01|
|Oracle Linux version 7 (firefox)||ELSA-2020-5239||2020-12-01|
|Oracle Linux version 7 (thunderbird)||ELSA-2020-5235||2020-12-01|
|Oracle Linux version 8 (firefox)||ELSA-2020-5237||2020-12-01|
|Oracle Linux version 8 (thunderbird)||ELSA-2020-5236||2020-12-01|
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team