CVE-2020-12422

high

Description

In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.

References

https://www.mozilla.org/security/advisories/mfsa2020-24/

https://bugzilla.mozilla.org/show_bug.cgi?id=1450353

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html

https://security.gentoo.org/glsa/202007-10

Details

Source: MITRE

Published: 2020-07-09

Updated: 2023-01-27

Type: CWE-787

Risk Information

CVSS v2

Base Score: 7.6

Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 4.9

Severity: HIGH

CVSS v3

Base Score: 8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.8

Severity: HIGH