The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2029-1 | firefox-esr security update |
![]() |
DLA-2036-1 | thunderbird security update |
![]() |
DSA-4580-1 | firefox-esr security update |
![]() |
DSA-4585-1 | thunderbird security update |
![]() |
EUVD-2019-7479 | The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71. |
![]() |
USN-4216-1 | Firefox vulnerabilities |
![]() |
USN-4216-2 | Firefox vulnerabilities |
![]() |
USN-4241-1 | Thunderbird vulnerabilities |
![]() |
USN-4335-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-05T01:24:48.626Z
Reserved: 2019-09-30T00:00:00
Link: CVE-2019-17005

No data.

Status : Modified
Published: 2020-01-08T22:15:11.653
Modified: 2024-11-21T04:31:31.423
Link: CVE-2019-17005


No data.