First published: Tue Jul 28 2020(Updated: )
Last updated 24 July 2024
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <78.1 | 78.1 |
Mozilla Thunderbird | <78.1 | 78.1 |
Mozilla Firefox | <79 | 79 |
Mozilla Firefox | <79.0 | |
Mozilla Firefox ESR | <78.1 | |
Mozilla Thunderbird | <78.1 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
debian/firefox | 132.0.2-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.4.0esr-1~deb11u1 1:115.16.0esr-1~deb12u1 1:128.4.0esr-1~deb12u1 1:128.4.2esr-1 1:128.4.3esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2020-15658 is low.
Mozilla Firefox ESR versions up to 78.1, Mozilla Thunderbird versions up to 78.1, and Mozilla Firefox versions up to 79 are affected by CVE-2020-15658.
An attacker can exploit CVE-2020-15658 by cutting off the file ending at an earlier position during a file download, leading to a different file type being downloaded than shown in the dialog.
Yes, updating Mozilla Firefox ESR to version 78.1 or later, Mozilla Thunderbird to version 78.1 or later, and Mozilla Firefox to version 79 or later will fix CVE-2020-15658.
More information about CVE-2020-15658 can be found at the following references: [Mozilla Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1637745), [Mozilla Security Advisory](https://www.mozilla.org/en-US/security/advisories/mfsa2020-33/), [Mozilla Security Advisory](https://www.mozilla.org/en-US/security/advisories/mfsa2020-30/).