Vulnerability Name: | CVE-2022-42928 (CCN-238609) | ||||||||||||||||||||||||||||||||
Assigned: | 2022-10-18 | ||||||||||||||||||||||||||||||||
Published: | 2022-10-18 | ||||||||||||||||||||||||||||||||
Updated: | 2023-01-04 | ||||||||||||||||||||||||||||||||
Summary: | Certain types of allocations were missing annotations that, if the Garbage Collector was in a specific state, could have lead to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-120 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-42928 Source: security@mozilla.org Type: Issue Tracking, Permissions Required security@mozilla.org Source: XF Type: UNKNOWN mozilla-firefox-cve202242928-code-exec(238609) Source: CCN Type: IBM Security Bulletin 6842099 (Application Performance Management) Multiple vulnerabilities of Mozilla Firefox (less than Firefox 102.4ESR) have affected Synthetic Playback Agent 8.1.4.0-8.1.4 IF16 - 2022.4.0 Source: CCN Type: IBM Security Bulletin 6891067 (Cloud Pak for Multicloud Management Monitoring) Multiple vulnerabilities in Mozilla Firefox affect IBM Cloud Pak for Multicloud Management Monitoring. Source: CCN Type: Mozilla Foundation Security Advisory 2022-45 Security Vulnerabilities fixed in Firefox ESR 102.4 Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |