9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
68.9%
Severity: Critical
Date : 2020-04-08
CVE-ID : CVE-2020-6821 CVE-2020-6823 CVE-2020-6824 CVE-2020-6825
CVE-2020-6826
Package : firefox
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1127
The package firefox before version 75.0-1 is vulnerable to multiple
issues including arbitrary code execution, information disclosure and
access restriction bypass.
Upgrade to 75.0-1.
The problems have been fixed upstream in version 75.0.
None.
An information disclosure issue has been found in Firefox before 75.0.
When reading from areas partially or fully outside the source resource
with WebGL’s copyTexSubImage method, the specification requires the
returned values be zero. Previously, this memory was uninitialized,
leading to potentially sensitive data disclosure.
A security issue has been found in Firefox before 75.0, where a
malicious extension could have called
browser.identity.launchWebAuthFlow, controlling the redirect_uri, and
through the Promise returned, obtain the Auth code and gain access to
the user’s account at the service provider.
A security issue has been found in Firefox before 75.0, where generated
passwords may be identical on the same site between separate private
browsing sessions. Initially, a user opens a Private Browsing Window
and generates a password for a site, then closes the Private Browsing
Window but leaves Firefox open. Subsequently, if the user had opened a
new Private Browsing Window, revisited the same site, and generated a
new password - the generated passwords would have been identical,
rather than independent.
Several memory safety issues have been found in Firefox before 75.0.
Some of these bugs showed evidence of memory corruption and Mozilla
presumes that with enough effort some of these could have been
exploited to run arbitrary code.
Several memory safety issues have been found in Firefox before 75.0.
Some of these bugs showed evidence of memory corruption and Mozilla
presumes that with enough effort some of these could have been
exploited to run arbitrary code.
A remote attacker might be able to access sensitive information, bypass
security restrictions or execute arbitrary code.
https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/
https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/#CVE-2020-6821
https://bugzilla.mozilla.org/show_bug.cgi?id=1625404
https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/#CVE-2020-6823
https://bugzilla.mozilla.org/show_bug.cgi?id=1614919
https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/#CVE-2020-6824
https://bugzilla.mozilla.org/show_bug.cgi?id=1621853
https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/#CVE-2020-6825
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203
https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/#CVE-2020-6826
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1613009%2C1613195%2C1616734%2C1617488%2C1619229%2C1620719%2C1624897
https://security.archlinux.org/CVE-2020-6821
https://security.archlinux.org/CVE-2020-6823
https://security.archlinux.org/CVE-2020-6824
https://security.archlinux.org/CVE-2020-6825
https://security.archlinux.org/CVE-2020-6826
bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203
bugzilla.mozilla.org/buglist.cgi?bug_id=1613009%2C1613195%2C1616734%2C1617488%2C1619229%2C1620719%2C1624897
bugzilla.mozilla.org/show_bug.cgi?id=1614919
bugzilla.mozilla.org/show_bug.cgi?id=1621853
bugzilla.mozilla.org/show_bug.cgi?id=1625404
security.archlinux.org/AVG-1127
security.archlinux.org/CVE-2020-6821
security.archlinux.org/CVE-2020-6823
security.archlinux.org/CVE-2020-6824
security.archlinux.org/CVE-2020-6825
security.archlinux.org/CVE-2020-6826
www.mozilla.org/en-US/security/advisories/mfsa2020-12/
www.mozilla.org/en-US/security/advisories/mfsa2020-12/#CVE-2020-6821
www.mozilla.org/en-US/security/advisories/mfsa2020-12/#CVE-2020-6823
www.mozilla.org/en-US/security/advisories/mfsa2020-12/#CVE-2020-6824
www.mozilla.org/en-US/security/advisories/mfsa2020-12/#CVE-2020-6825
www.mozilla.org/en-US/security/advisories/mfsa2020-12/#CVE-2020-6826
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
68.9%