First published: Tue May 05 2020(Updated: )
A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <68.8 | 68.8 |
Mozilla Thunderbird | <68.8 | 68.8 |
Mozilla Firefox | <76 | 76 |
Mozilla Firefox | <76.0 | |
Mozilla Firefox ESR | <68.8.0 | |
Mozilla Thunderbird | <68.8.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Canonical Ubuntu Linux | =20.04 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.2 | |
Google Chrome | <81.0.4044.138 | 81.0.4044.138 |
debian/chromium | 120.0.6099.224-1~deb11u1 128.0.6613.84-1~deb12u1 128.0.6613.137-1~deb12u1 128.0.6613.113-1~deb13u1 128.0.6613.137-1 | |
debian/firefox | 130.0-2 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 115.15.0esr-1~deb11u1 115.14.0esr-1~deb12u1 115.15.0esr-1~deb12u1 115.15.0esr-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:115.15.0-1~deb11u1 1:115.12.0-1~deb12u1 1:115.15.0-1~deb12u1 1:128.1.1esr-1 1:128.2.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)