7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
52.2%
A vulnerability exists in the Windows sandbox where an uninitialized value
in memory can be leaked to a renderer from a broker when making a call to
access an otherwise unavailable file. This results in the potential leaking
of information stored at that memory location. Note: this issue only
occurs on Windows. Other operating systems are unaffected.. This
vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR <
60.7.
Author | Note |
---|---|
tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
chrisccoulson | Windows only bug |
launchpad.net/bugs/cve/CVE-2019-11694
nvd.nist.gov/vuln/detail/CVE-2019-11694
security-tracker.debian.org/tracker/CVE-2019-11694
www.cve.org/CVERecord?id=CVE-2019-11694
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11694
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11694
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
52.2%