CVE-2020-12425
Mozilla: Out of bound read in Date.parse()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Due to confusion processing a hyphen character in Date.parse(), a one-byte out of bounds read could have occurred, leading to potential information disclosure. This vulnerability affects Firefox < 78.
Debido a una confusión al procesar un carácter hyph en la función Date.parse(), podría haber ocurrido una lectura fuera de límites de un byte, conllevando a una potencial divulgación de información. Esta vulnerabilidad afecta a Firefox versiones anteriores a 78
An update that fixes 13 vulnerabilities is now available. This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues. AppCache manifest poisoning due to url encoded character processing. Use-after-free in WebRTC VideoBroadcaster. Memory corruption due to missing sign-extension for ValueTags on ARM64. Information disclosure due to manipulated URL object. Use-after-free in nsGlobalWindowInner. Use-After-Free when trying to connect to a STUN server. RSA Key Generation vulnerable to side-channel attack. Add-On updates did not respect the same certificate trust rules as software updates. Integer overflow in nsJPEGEncoder::emptyOutputBuffer. DLL Hijacking due to searching %PATH% for a library. WebRTC permission prompt could have been bypassed by a compromised content process. Out of bound read in Date.parse. Memory safety bugs fixed in Firefox 78. This update was imported from the SUSE:SLE-15:Update update project.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-04-28 CVE Reserved
- 2020-07-02 CVE Published
- 2024-08-04 CVE Updated
- 2025-08-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (7)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|