First published: Wed Jul 15 2020(Updated: )
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
Credit: natashenka Google Project Zeronatashenka Google Project Zeronatashenka Google Project Zeronatashenka Google Project Zero chrome-cve-admin@google.com chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <68.11 | 68.11 |
Apple Safari | <13.1.2 | 13.1.2 |
Google Chrome | <84.0.4147.89 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Backports SLE | =15.0-sp2 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Apple Safari | <13.1.2 | |
Apple iPadOS | <13.6 | |
Apple iPhone OS | <13.6 | |
Apple tvOS | <13.4.8 | |
Apple watchOS | <6.2.8 | |
Apple watchOS | <6.2.8 | 6.2.8 |
Apple tvOS | <13.4.8 | 13.4.8 |
Mozilla Firefox ESR | <78.1 | 78.1 |
Mozilla Thunderbird | <78.1 | 78.1 |
Mozilla Thunderbird | <68.11 | 68.11 |
Mozilla Firefox | <79 | 79 |
Apple iOS | <13.6 | 13.6 |
Apple iPadOS | <13.6 | 13.6 |
debian/chromium | 120.0.6099.224-1~deb11u1 128.0.6613.84-1~deb12u1 130.0.6723.69-1~deb12u1 129.0.6668.89-1 130.0.6723.69-1 | |
debian/firefox | 132.0-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.4.0esr-1~deb11u1 115.14.0esr-1~deb12u1 128.4.0esr-1~deb12u1 128.3.1esr-2 128.4.0esr-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:115.16.0esr-1~deb11u1 1:115.12.0-1~deb12u1 1:115.16.0esr-1~deb12u1 1:128.3.2esr-1 1:128.4.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2020-6514 is a memory corruption issue in WebRTC that allows bypassing ASLR.
The affected software includes Mozilla Firefox ESR (version up to 68.11), Apple iOS (version up to 13.6), Apple iPadOS (version up to 13.6), Apple Safari (version up to 13.1.2), Apple watchOS (version up to 6.2.8), Apple tvOS (version up to 13.4.8), Mozilla Thunderbird (version up to 78.1), Mozilla Firefox (version up to 79).
CVE-2020-6514 has a severity rating of high, with a severity score of 7.
To fix CVE-2020-6514, you should update your software to the latest available version provided by the vendor.
You can find more information about CVE-2020-6514 in the following references: [1] [2] [3].