First published: Tue Apr 07 2020(Updated: )
Last updated 24 July 2024
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <68.7 | 68.7 |
Mozilla Firefox ESR | <68.7 | 68.7 |
Mozilla Firefox | <75 | 75 |
Mozilla Firefox | <75.0 | |
Mozilla Firefox ESR | <68.7.0 | |
Mozilla Thunderbird | <68.7.0 | |
debian/firefox | 132.0.2-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.4.0esr-1~deb11u1 128.3.1esr-1~deb12u1 128.4.0esr-1~deb12u1 128.4.0esr-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.4.3esr-1~deb11u1 1:115.16.0esr-1~deb12u1 1:128.4.3esr-1~deb12u1 1:128.4.3esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-6822 is a vulnerability that allows an out-of-bounds write when processing large images in Mozilla Thunderbird and Firefox.
CVE-2020-6822 affects Thunderbird versions prior to 68.7.0 and Firefox ESR versions prior to 68.7. This vulnerability allows arbitrary code execution.
CVE-2020-6822 has a severity score of 8.8, which is considered high.
To fix CVE-2020-6822, update Thunderbird to version 68.7.0 or later, and Firefox ESR to version 68.7 or later.
You can find more information about CVE-2020-6822 in the references provided: [Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1544181), [Mozilla Security Advisories](https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/), and [MITRE CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6822).