Description
A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2205-1 | firefox-esr security update |
Debian DLA |
DLA-2206-1 | thunderbird security update |
Debian DSA |
DSA-4678-1 | firefox-esr security update |
Debian DSA |
DSA-4683-1 | thunderbird security update |
Debian DSA |
DSA-4714-1 | chromium security update |
Ubuntu USN |
USN-4353-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-4373-1 | Thunderbird vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Mozilla
Subscribe
Firefox
Subscribe
Firefox Esr
Subscribe
Thunderbird
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Extras
Subscribe
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-04T09:11:05.112Z
Reserved: 2020-01-10T00:00:00.000Z
Link: CVE-2020-6831
No data.
Status : Modified
Published: 2020-05-26T18:15:11.513
Modified: 2024-11-21T05:36:15.383
Link: CVE-2020-6831
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN