Mozilla Firefox/Firefox ESR/Thunderbird Video Driver heap-based overflow

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.0 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, was found in Mozilla Firefox, Firefox ESR and Thunderbird. Affected is an unknown function of the component Video Driver. Executing a manipulation can lead to heap-based overflow. This vulnerability is handled as CVE-2020-26971. The attack can be executed remotely. There is not any exploit available. You should upgrade the affected component. Once again VulDB remains the best source for vulnerability data.
Details
A vulnerability has been found in Mozilla Firefox, Firefox ESR and Thunderbird (Web Browser) (affected version not known) and classified as critical. This vulnerability affects some unknown functionality of the component Video Driver. The manipulation with an unknown input leads to a heap-based overflow vulnerability. The CWE definition for the vulnerability is CWE-122. A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was released 01/07/2021. The advisory is available at mozilla.org. This vulnerability was named CVE-2020-26971. Successful exploitation requires user interaction by the victim. The technical details are unknown and an exploit is not available. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 10/10/2024).
The vulnerability scanner Nessus provides a plugin with the ID 208652 (CentOS 7 : firefox (RHSA-2020:5561)), which helps to determine the existence of the flaw in a target environment.
Upgrading eliminates this vulnerability. The upgrade is hosted for download at mozilla.org.
The vulnerability is also documented in the vulnerability database at Tenable (208652). Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.mozilla.org/
- Product: https://www.mozilla.org/en-US/firefox/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.3VulDB Meta Temp Score: 6.0
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Heap-based overflowCWE: CWE-122 / CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 208652
Nessus Name: CentOS 7 : firefox (RHSA-2020:5561)
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: mozilla.org
Timeline
01/07/2021 🔍01/07/2021 🔍
05/04/2025 🔍
Sources
Vendor: mozilla.orgProduct: mozilla.org
Advisory: mozilla.org
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2020-26971 (🔍)
GCVE (CVE): GCVE-0-2020-26971
GCVE (VulDB): GCVE-100-167386
Entry
Created: 01/07/2021 07:30 PMUpdated: 05/04/2025 03:25 PM
Changes: 01/07/2021 07:30 PM (39), 10/10/2024 01:53 AM (19), 05/04/2025 03:25 PM (3)
Complete: 🔍
Cache ID: 244:024:40
No comments yet. Languages: en.
Please log in to comment.