mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
114 lines
4.4 KiB
JSON
114 lines
4.4 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-11699",
|
|
"ASSIGNER": "security@mozilla.org",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Memory safety bugs present in Firefox 132, Firefox ESR 128.4, and Thunderbird 128.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Memory safety bugs fixed in Firefox 133, Firefox ESR 128.5, and Thunderbird 128.5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Mozilla",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Firefox",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "unspecified",
|
|
"version_value": "133"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Firefox ESR",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "unspecified",
|
|
"version_value": "128.5"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Thunderbird",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "unspecified",
|
|
"version_value": "133"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1880582%2C1929911",
|
|
"refsource": "MISC",
|
|
"name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1880582%2C1929911"
|
|
},
|
|
{
|
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
|
"refsource": "MISC",
|
|
"name": "https://www.mozilla.org/security/advisories/mfsa2024-63/"
|
|
},
|
|
{
|
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
|
|
"refsource": "MISC",
|
|
"name": "https://www.mozilla.org/security/advisories/mfsa2024-64/"
|
|
},
|
|
{
|
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
|
"refsource": "MISC",
|
|
"name": "https://www.mozilla.org/security/advisories/mfsa2024-67/"
|
|
},
|
|
{
|
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
|
|
"refsource": "MISC",
|
|
"name": "https://www.mozilla.org/security/advisories/mfsa2024-68/"
|
|
}
|
|
]
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Andrew McCreight, Akmat Suleimanov"
|
|
}
|
|
]
|
|
} |