Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-6799
HistoryMar 02, 2020 - 12:00 a.m.

CVE-2020-6799

2020-03-0200:00:00
ubuntu.com
ubuntu.com
9

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

68.0%

Command line arguments could have been injected during Firefox invocation
as a shell handler for certain unsupported file types. This required
Firefox to be configured as the default handler for a given file type and
for a file downloaded to be opened in a third party application that
insufficiently sanitized URL data. In that situation, clicking a link in
the third party application could have been used to retrieve and execute
files whose location was supplied through command line arguments. Note:
This issue only affects Windows operating systems and when Firefox is
configured as the default handler for non-default filetypes. Other
operating systems are unaffected. This vulnerability affects Firefox < 73
and Firefox < ESR68.5.

Notes

Author Note
tyhicks mozjs contains a copy of the SpiderMonkey JavaScript engine

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

68.0%

Related for UB:CVE-2020-6799