First published: Tue Nov 17 2020(Updated: )
When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <78.5 | 78.5 |
<83 | 83 | |
<78.5 | 78.5 | |
<78.5 | 78.5 | |
Mozilla Firefox | <83.0 | |
Mozilla Firefox ESR | <78.5 | |
Mozilla Thunderbird | <78.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-26961 is a vulnerability related to DNS over HTTPS (DoH) in Mozilla products, including Firefox ESR, Thunderbird, and Firefox.
CVE-2020-26961 has a severity rating of 6.5 (Medium).
Mozilla Firefox ESR versions up to and excluding 78.5, Mozilla Thunderbird versions up to and excluding 78.5, and Mozilla Firefox versions up to and excluding 83.0 are affected by CVE-2020-26961.
CVE-2020-26961 allows IPv4 addresses mapped through IPv6 to bypass the intentional filtering of RFC1918 and related IP ranges in DoH, potentially leading to a DNS Rebinding attack.
To fix CVE-2020-26961, update your Mozilla Firefox ESR to version 78.5 and Thunderbird to version 78.5, or update Mozilla Firefox to version 83.0 or newer.