A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an malicious user to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird < 60.2.1, Firefox ESR < 60.2.1, and Firefox < 62.0.2.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat enterprise linux server eus 7.6 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux desktop 7.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux server 7.0 |
||
redhat enterprise linux server aus 7.6 |
||
redhat enterprise linux workstation 7.0 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux server eus 7.5 |
||
redhat enterprise linux server tus 7.6 |
||
debian debian linux 8.0 |
||
debian debian linux 9.0 |
||
canonical ubuntu linux 16.04 |
||
canonical ubuntu linux 14.04 |
||
canonical ubuntu linux 18.04 |
||
mozilla firefox |
||
mozilla firefox esr |
||
mozilla thunderbird |