Lucene search

K
debianDebianDEBIAN:DSA-5509-1:A7397
HistorySep 29, 2023 - 5:55 p.m.

[SECURITY] [DSA 5509-1] firefox-esr security update

2023-09-2917:55:10
lists.debian.org
30
buffer overflow
mozilla firefox esr
vp8 media

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.245 Low

EPSS

Percentile

96.7%


Debian Security Advisory DSA-5509-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
September 29, 2023 https://www.debian.org/security/faq


Package : firefox-esr
CVE ID : CVE-2023-5217

A buffer overflow in VP8 media stream processing has been found in the
Mozilla Firefox web browser, which could potentially result in the
execution of arbitrary code.

For the oldstable distribution (bullseye), this problem has been fixed
in version 115.3.1esr-1~deb11u1.

For the stable distribution (bookworm), this problem will be fixed
via the libvpx source package, Firefox ESR in Bookworm links dynamically
against libvpx.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.245 Low

EPSS

Percentile

96.7%