CVE-2019-11745
Published on: 01/08/2020 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:35 PM UTC
Certain versions of Ubuntu Linux from Canonical contain the following vulnerability:
When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- CVE-2019-11745 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
Mozilla - Thunderbird version before 68.3
- Affected Vendor/Software:
Mozilla - Firefox ESR version before 68.3
- Affected Vendor/Software:
Mozilla - Firefox version before 71
CVSS3 Score: 8.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 6.8 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Mozilla Thunderbird: Multiple vulnerabilities (GLSA 202003-10) — Gentoo security | Third Party Advisory security.gentoo.org text/html |
![]() |
Mozilla Network Security Service: Multiple vulnerabilities (GLSA 202003-37) — Gentoo security | Third Party Advisory security.gentoo.org text/html |
![]() |
Mozilla Firefox: Multiple vulnerabilities (GLSA 202003-02) — Gentoo security | Third Party Advisory security.gentoo.org text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
Security Vulnerabilities fixed in - Firefox 71 — Mozilla | Vendor Advisory www.mozilla.org text/html |
![]() |
Siemens RUGGEDCOM ROX II | CISA | Third Party Advisory US Government Resource us-cert.cisa.gov text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
Security Vulnerabilities fixed in - Thunderbird 68.3 — Mozilla | Vendor Advisory web.archive.org text/html Inactive LinkNot Archived |
![]() |
[security-announce] openSUSE-SU-2020:0003-1: important: Security update | Mailing List Third Party Advisory lists.opensuse.org text/html |
![]() |
[security-announce] openSUSE-SU-2020:0002-1: important: Security update | Issue Tracking Mailing List Third Party Advisory lists.opensuse.org text/html |
![]() |
USN-4335-1: Thunderbird vulnerabilities | Ubuntu security notices | Third Party Advisory usn.ubuntu.com text/html |
![]() |
Security Vulnerabilities fixed in - Firefox ESR 68.3 — Mozilla | Vendor Advisory www.mozilla.org text/html |
![]() |
[SECURITY] [DLA 2388-1] nss security update | Mailing List Third Party Advisory lists.debian.org text/html |
![]() |
1586176 - (CVE-2019-11745) Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate | Issue Tracking Patch Vendor Advisory bugzilla.mozilla.org text/html |
![]() |
Third Party Advisory cert-portal.siemens.com application/pdf |
![]() | |
[security-announce] openSUSE-SU-2020:0008-1: moderate: Security update f | Mailing List Third Party Advisory lists.opensuse.org text/html |
![]() |
USN-4241-1: Thunderbird vulnerabilities | Ubuntu security notices | Ubuntu | Third Party Advisory usn.ubuntu.com text/html |
![]() |
Related QID Numbers
- 256751 CentOS Security Update for nss (CESA-2019:4190)
- 296073 Oracle Solaris 11.4 Support Repository Update (SRU) 24.75.2 Missing (CPUJUL2020)
- 354771 Amazon Linux Security Advisory for nss-util : ALAS2-2023-1942
- 377168 Alibaba Cloud Linux Security Update for nss, nss-softokn, nss-util (ALINUX2-SA-2020:0005)
- 378291 Virtuozzo Linux Security Update for nss-softokn-devel (VZLSA-2019:4152)
- 500455 Alpine Linux Security Update for nss
Known Affected Configurations (CPE V2.3)
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*:
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*:
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_mx5000_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_mx5000_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1400_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1400_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1500_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1500_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1501_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1501_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1510:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1510:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1510_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1510_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1511:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1511:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1511_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1511_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1512:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1512:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1512_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1512_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx5000:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx5000:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx5000_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx5000_firmware:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE