CVE-2023-25732

CVE Details

Release Date:2023-06-02

Description


When encoding data from an <code>inputStream</code> in <code>xpcom</code> the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.

See more information about CVE-2023-25732 from MITRE CVE dictionary and NIST NVD


CVSS v3.0 metrics


NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.

Base Score: 8.8 Base Metrics: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Access Vector: Network Attack Complexity: Low
Privileges Required: None User Interaction: Required
Scope: Unchanged Confidentiality Impact: High
Integrity Impact: High Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 7 (firefox)ELSA-2023-08122023-02-21
Oracle Linux version 7 (thunderbird)ELSA-2023-08172023-02-21
Oracle Linux version 8 (firefox)ELSA-2023-08082023-02-20
Oracle Linux version 8 (thunderbird)ELSA-2023-08212023-02-20
Oracle Linux version 9 (firefox)ELSA-2023-08102023-02-20
Oracle Linux version 9 (thunderbird)ELSA-2023-08242023-02-20



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete