Vulnerability Name: | CVE-2022-42929 (CCN-238610) | ||||||||||||||||||||||||||||||||
Assigned: | 2022-10-18 | ||||||||||||||||||||||||||||||||
Published: | 2022-10-18 | ||||||||||||||||||||||||||||||||
Updated: | 2023-01-04 | ||||||||||||||||||||||||||||||||
Summary: | If a website called <code>window.print()</code> in a particular way, it could cause a denial of service of the browser, which may persist beyond browser restart depending on the user's session restore settings. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.3 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-400 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-42929 Source: security@mozilla.org Type: Issue Tracking, Permissions Required security@mozilla.org Source: XF Type: UNKNOWN mozilla-firefox-cve202242929-dos(238610) Source: CCN Type: IBM Security Bulletin 6842099 (Application Performance Management) Multiple vulnerabilities of Mozilla Firefox (less than Firefox 102.4ESR) have affected Synthetic Playback Agent 8.1.4.0-8.1.4 IF16 - 2022.4.0 Source: CCN Type: IBM Security Bulletin 6891067 (Cloud Pak for Multicloud Management Monitoring) Multiple vulnerabilities in Mozilla Firefox affect IBM Cloud Pak for Multicloud Management Monitoring. Source: CCN Type: Mozilla Foundation Security Advisory 2022-45 Security Vulnerabilities fixed in Firefox ESR 102.4 Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |