{ "id": "CVE-2022-28285", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:24.303", "lastModified": "2024-11-21T06:57:06.777", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "When generating the assembly code for MLoadTypedArrayElementHole, an incorrect AliasSet was used. In conjunction with another vulnerability this could have been used for an out of bounds memory read. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8." }, { "lang": "es", "value": "Al generar el c\u00f3digo ensamblador para MLoadTypedArrayElementHole, se utiliz\u00f3 un AliasSet incorrecto. Junto con otra vulnerabilidad, esto podr\u00eda haberse utilizado para una lectura de memoria fuera de los l\u00edmites. Esta vulnerabilidad afecta a Thunderbird < 91.8, Firefox < 99 y Firefox ESR < 91.8." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-125" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "99.0", "matchCriteriaId": "A841617D-181C-45FF-868A-33DD504B1BA8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "versionEndExcluding": "91.8", "matchCriteriaId": "AB18B69A-EE03-4E15-A9AA-FCF442042761" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionEndExcluding": "91.8", "matchCriteriaId": "9DCED53B-8838-45E1-A516-90C99C7DF6F9" } ] } ] } ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1756957", "source": "security@mozilla.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2022-13/", "source": "security@mozilla.org", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2022-14/", "source": "security@mozilla.org", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2022-15/", "source": "security@mozilla.org", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1756957", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2022-13/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2022-14/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2022-15/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ] } ] }