First published: Tue Jan 05 2021(Updated: )
A malicious peer could have modified a COOKIE-ECHO chunk in a SCTP packet in a way that potentially resulted in a use-after-free. We presume that with enough effort it could have been exploited to run arbitrary code.
Credit: chrome-cve-admin@google.com Ned Williamson Project Zero
Affected Software | Affected Version | How to fix |
---|---|---|
debian/chromium | 90.0.4430.212-1~deb10u1 | |
debian/firefox | 118.0.2-1 | |
debian/firefox-esr | 91.12.0esr-1~deb10u1 115.3.1esr-1~deb10u1 102.15.0esr-1~deb11u1 115.3.1esr-1~deb11u1 102.15.1esr-1~deb12u1 115.3.0esr-1~deb12u1 115.3.0esr-1 | |
debian/thunderbird | 1:91.12.0-1~deb10u1 1:115.3.1-1~deb10u1 1:102.13.1-1~deb11u1 1:115.3.1-1~deb11u1 1:102.15.1-1~deb12u1 1:115.3.1-1~deb12u1 1:115.3.1-1 | |
Mozilla Firefox | <84.0.2 | 84.0.2 |
Mozilla Firefox ESR | <78.6.1 | 78.6.1 |
All of | ||
Mozilla Firefox | =84.1.3 | |
Google Android | ||
Google Chrome | <88.0.4324.96 | |
Mozilla Thunderbird | <78.6.1 | 78.6.1 |
Google Chrome | <88.0.4324.96 | 88.0.4324.96 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)