{ "id": "CVE-2022-28285", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:24.303", "lastModified": "2022-12-30T20:46:36.213", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "When generating the assembly code for MLoadTypedArrayElementHole, an incorrect AliasSet was used. In conjunction with another vulnerability this could have been used for an out of bounds memory read. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "99.0", "matchCriteriaId": "A841617D-181C-45FF-868A-33DD504B1BA8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "versionEndExcluding": "91.8", "matchCriteriaId": "AB18B69A-EE03-4E15-A9AA-FCF442042761" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionEndExcluding": "91.8", "matchCriteriaId": "9DCED53B-8838-45E1-A516-90C99C7DF6F9" } ] } ] } ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1756957", "source": "security@mozilla.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2022-13/", "source": "security@mozilla.org", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2022-14/", "source": "security@mozilla.org", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2022-15/", "source": "security@mozilla.org", "tags": [ "Exploit", "Vendor Advisory" ] } ] }