Show plain JSON{"acknowledgement": "Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Ronald Crane as the original reporter.", "affected_release": [{"advisory": "RHSA-2023:1333", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "firefox-0:102.9.0-3.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-03-20T00:00:00Z"}, {"advisory": "RHSA-2023:1401", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "thunderbird-0:102.9.0-1.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-03-22T00:00:00Z"}, {"advisory": "RHSA-2023:1336", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "firefox-0:102.9.0-3.el8_7", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-03-20T00:00:00Z"}, {"advisory": "RHSA-2023:1403", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "thunderbird-0:102.9.0-1.el8_7", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-03-22T00:00:00Z"}, {"advisory": "RHSA-2023:1442", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "thunderbird-0:102.9.0-2.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1479", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "firefox-0:102.9.0-4.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-03-27T00:00:00Z"}, {"advisory": "RHSA-2023:1443", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "thunderbird-0:102.9.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1445", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "firefox-0:102.9.0-4.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1443", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "thunderbird-0:102.9.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1445", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "firefox-0:102.9.0-4.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1443", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "thunderbird-0:102.9.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1445", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "firefox-0:102.9.0-4.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1444", "cpe": "cpe:/a:redhat:rhel_eus:8.4", "package": "firefox-0:102.9.0-4.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1472", "cpe": "cpe:/a:redhat:rhel_eus:8.4", "package": "thunderbird-0:102.9.0-2.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2023-03-27T00:00:00Z"}, {"advisory": "RHSA-2023:1367", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "firefox-0:102.9.0-3.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-03-21T00:00:00Z"}, {"advisory": "RHSA-2023:1404", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "thunderbird-0:102.9.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-03-22T00:00:00Z"}, {"advisory": "RHSA-2023:1337", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "firefox-0:102.9.0-3.el9_1", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-03-20T00:00:00Z"}, {"advisory": "RHSA-2023:1407", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "thunderbird-0:102.9.0-1.el9_1", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-03-22T00:00:00Z"}, {"advisory": "RHSA-2023:1364", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "firefox-0:102.9.0-3.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-03-21T00:00:00Z"}, {"advisory": "RHSA-2023:1402", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "thunderbird-0:102.9.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-03-22T00:00:00Z"}], "bugzilla": {"description": "Mozilla: Potential out-of-bounds when accessing throttled streams", "id": "2178460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178460"}, "csaw": false, "cvss3": {"cvss3_base_score": "6.1", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "status": "verified"}, "cwe": "CWE-125", "details": ["When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.", "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue that when accessing throttled streams, the count of available bytes needs to be checked in the calling function to be within bounds. This may have led future code to be incorrect and vulnerable."], "name": "CVE-2023-25752", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 6"}], "public_date": "2023-03-14T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-25752\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-25752\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-10/#CVE-2023-25752\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-11/#CVE-2023-25752"], "statement": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.", "threat_severity": "Moderate"}