Vulnerability Name: | CVE-2022-2505 (CCN-232060) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2022-07-26 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2022-07-26 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2023-01-03 | ||||||||||||||||||||||||||||||||||||||||
Summary: | Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.1, Firefox < 103, and Thunderbird < 102.1. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-120 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-2505 Source: security@mozilla.org Type: Not Applicable, Vendor Advisory security@mozilla.org Source: XF Type: UNKNOWN firefox-cve20222505-code-exec(232060) Source: CCN Type: IBM Security Bulletin 6839439 (Application Performance Management) Multiple vulnerabilities of Mozilla Firefox (less than Firefox 102.2ESR) have affected Synthetic Playback Agent 8.1.4.0-8.1.4 IF16 - 2022.4.0 Source: CCN Type: Mozilla Foundation Security Advisory 2022-28 Security Vulnerabilities fixed in Firefox 103 Source: CCN Type: Mozilla Foundation Security Advisory 2022-30 Security Vulnerabilities fixed in Firefox ESR 102.1 Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |