CVE-2019-17005

The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Information

Published : 2020-01-08 22:15

Updated : 2021-07-21 11:39


NVD link : CVE-2019-17005

Mitre link : CVE-2019-17005


JSON object : View

Products Affected

opensuse

  • leap

mozilla

  • firefox_esr
  • thunderbird
  • firefox
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')