First published: Tue Nov 15 2022(Updated: )
Keyboard events reference strings like "KeyA" that were at fixed, known, and widely-spread addresses. Cache-based timing attacks such as Prime+Probe could have possibly figured out which keys were being pressed.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <102.5 | 102.5 |
Mozilla Firefox ESR | <102.5 | 102.5 |
Mozilla Firefox | <107 | 107 |
Mozilla Firefox | <107.0 | |
Mozilla Firefox ESR | <102.5 | |
Mozilla Thunderbird | <102.5 | |
<107.0 | ||
<102.5 | ||
<102.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this vulnerability is CVE-2022-45416.
This vulnerability affects Firefox ESR versions before 102.5, Thunderbird versions before 102.5, and Firefox versions before 107.
The severity of CVE-2022-45416 is medium with a CVSS score of 6.5.
This vulnerability could allow cache-based timing attacks to figure out which keys are being pressed during keyboard events.
To fix CVE-2022-45416, update to Firefox ESR version 102.5 or later, Thunderbird version 102.5 or later, or Firefox version 107 or later.