Vulnerability Name: | CVE-2021-43535 (CCN-214851) | ||||||||||||||||||||
Assigned: | 2021-11-02 | ||||||||||||||||||||
Published: | 2021-11-02 | ||||||||||||||||||||
Updated: | 2022-03-17 | ||||||||||||||||||||
Summary: | A use-after-free could have occured when an HTTP2 session object was released on a different thread, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 93, Thunderbird < 91.3, and Firefox ESR < 91.3. | ||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
7.7 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-416 | ||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-43535 Source: MISC Type: Issue Tracking, Permissions Required, Vendor Advisory https://bugzilla.mozilla.org/show_bug.cgi?id=1667102 Source: XF Type: UNKNOWN mozilla-firefox-cve202143535-dos(214851) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20211229 [SECURITY] [DLA 2863-1] firefox-esr security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update Source: DEBIAN Type: Third Party Advisory DSA-5026 Source: DEBIAN Type: Issue Tracking, Third Party Advisory DSA-5034 Source: CCN Type: Mozilla Foundation Security Advisory 2021-43 Mozilla Foundation Security Advisory 2021-43 Security Vulnerabilities fixed in Firefox 93 Source: CCN Type: Mozilla Foundation Security Advisory 2021-49 Security Vulnerabilities fixed in Firefox ESR 91.3 Source: CCN Type: Mozilla Foundation Security Advisory 2021-50 Security Vulnerabilities fixed in Thunderbird 91.3 Source: MISC Type: Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2021-43/ Source: MISC Type: Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2021-49/ Source: MISC Type: Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2021-50/ | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |