CVE-2019-11759
moderate-risk
Published 2020-01-08
An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. This could be used by an attacker to execute arbitrary code or more likely lead to a crash. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.
Do I need to act?
~
2.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (4)
References (12)
Issue Tracking
https://bugzilla.mozilla.org/show_bug.cgi?id=1577953
Third Party Advisory
https://security.gentoo.org/glsa/202003-10
Third Party Advisory
https://usn.ubuntu.com/4335-1/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2019-33/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2019-34/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2019-35/
Issue Tracking
https://bugzilla.mozilla.org/show_bug.cgi?id=1577953
Third Party Advisory
https://security.gentoo.org/glsa/202003-10
Third Party Advisory
https://usn.ubuntu.com/4335-1/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2019-33/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2019-34/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2019-35/
46
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
6/34 · Minimal
Exposure
10/34 · Low