Description
When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4713-1 | firefox-esr security update |
Debian DSA |
DSA-4718-1 | thunderbird security update |
EUVD |
EUVD-2020-4732 | When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0. |
Ubuntu USN |
USN-4408-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-4421-1 | Thunderbird vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-04T11:56:51.667Z
Reserved: 2020-04-28T00:00:00.000Z
Link: CVE-2020-12420
No data.
Status : Modified
Published: 2020-07-09T15:15:11.973
Modified: 2024-11-21T04:59:41.673
Link: CVE-2020-12420
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN