Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2020-6831
Description:A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
Test IDs: 1.3.6.1.4.1.25623.1.0.844445   1.3.6.1.4.1.25623.1.0.853144   1.3.6.1.4.1.25623.1.0.883235   1.3.6.1.4.1.25623.1.0.844422   1.3.6.1.4.1.25623.1.0.844425   1.3.6.1.4.1.25623.1.0.883234   1.3.6.1.4.1.25623.1.0.883237   1.3.6.1.4.1.25623.1.0.892206   1.3.6.1.4.1.25623.1.0.883233   1.3.6.1.4.1.25623.1.0.853155   1.3.6.1.4.1.25623.1.0.892205   1.3.6.1.4.1.25623.1.0.704678   1.3.6.1.4.1.25623.1.0.704683   1.3.6.1.4.1.25623.1.1.4.2020.1218.1   1.3.6.1.4.1.25623.1.1.4.2020.14359.1   1.3.6.1.4.1.25623.1.1.4.2020.1209.1  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2020-6831
Debian Security Information: DSA-4714 (Google Search)
https://www.debian.org/security/2020/dsa-4714
http://packetstormsecurity.com/files/158480/usrsctp-Stack-Buffer-Overflow.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1632241
https://security.gentoo.org/glsa/202005-03
https://security.gentoo.org/glsa/202005-04
https://www.mozilla.org/security/advisories/mfsa2020-16/
https://www.mozilla.org/security/advisories/mfsa2020-17/
https://www.mozilla.org/security/advisories/mfsa2020-18/
SuSE Security Announcement: openSUSE-SU-2020:0917 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html
https://usn.ubuntu.com/4373-1/




© 1998-2024 E-Soft Inc. All rights reserved.