The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of WebRTC: information disclosure via Internal Address Leak

Synthesis of the vulnerability 

An attacker can bypass access restrictions to data via Internal Address Leak of WebRTC, in order to obtain sensitive information.
Vulnerable systems: Debian, Fedora, Chrome, Edge Chromium, Firefox, openSUSE Leap, Opera, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu, WebRTC.org.
Severity of this threat: 2/4.
Creation date: 30/07/2020.
Références of this weakness: ADV200002, bulletinjul2020, CVE-2020-6514, DLA-2297-1, DLA-2310-1, DSA-4736-1, DSA-4740-1, DSA-4824-1, FEDORA-2020-84d87cbd50, FEDORA-2020-bf684961d9, MFSA2020-30, MFSA2020-31, MFSA2020-32, openSUSE-SU-2020:1020-1, openSUSE-SU-2020:1021-1, openSUSE-SU-2020:1048-1, openSUSE-SU-2020:1061-1, openSUSE-SU-2020:1147-1, openSUSE-SU-2020:1148-1, openSUSE-SU-2020:1155-1, openSUSE-SU-2020:1172-1, openSUSE-SU-2020:1179-1, openSUSE-SU-2020:1189-1, openSUSE-SU-2020:1205-1, RHSA-2020:3229-01, RHSA-2020:3233-01, RHSA-2020:3241-01, RHSA-2020:3253-01, RHSA-2020:3254-01, RHSA-2020:3341-01, RHSA-2020:3342-01, RHSA-2020:3343-01, RHSA-2020:3344-01, RHSA-2020:3345-01, RHSA-2020:3377-01, SSA:2020-209-01, SSA:2020-213-01, SUSE-SU-2020:14456-1, SUSE-SU-2020:2100-1, SUSE-SU-2020:2118-1, SUSE-SU-2020:2147-1, SUSE-SU-2020:2179-1, USN-4443-1, VIGILANCE-VUL-32960.

Description of the vulnerability 

An attacker can bypass access restrictions to data via Internal Address Leak of WebRTC, in order to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability bulletin impacts software or systems such as Debian, Fedora, Chrome, Edge Chromium, Firefox, openSUSE Leap, Opera, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu, WebRTC.org.

Our Vigil@nce team determined that the severity of this security note is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this cybersecurity note.

Solutions for this threat 

Chrome: version 84.0.4147.89.
The version 84.0.4147.89 is fixed:
  https://www.google.fr/chrome/

Debian 10: new chromium packages.
New packages are available:
  Debian 10: chromium 87.0.4280.88-0.4~deb10u1

Debian 10: new firefox-esr packages.
New packages are available:
  Debian 10: firefox-esr 68.11.0esr-1~deb10u1

Debian 10: new thunderbird packages.
New packages are available:
  Debian 10: thunderbird 1:68.11.0-1~deb10u1

Debian 9: new firefox-esr packages.
New packages are available:
  Debian 9: firefox-esr 68.11.0esr-1~deb9u1

Debian 9: new thunderbird packages.
New packages are available:
  Debian 9: thunderbird 1:68.11.0-1~deb9u1

Fedora 31: new chromium packages.
New packages are available:
  Fedora 31: chromium 84.0.4147.89-1.fc31

Fedora 32: new chromium packages.
New packages are available:
  Fedora 32: chromium 84.0.4147.89-1.fc32

Microsoft Edge Chromium: version 84.0.522.40.
The version 84.0.522.40 is fixed:
  https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV200002

Mozilla Firefox: version 68.11.
The version 68.11 is fixed:
  https://www.mozilla.org/

Mozilla Firefox: version 78.1.
The version 78.1 is fixed:
  https://www.mozilla.org/

Mozilla Firefox: version 79.
The version 79 is fixed:
  https://www.mozilla.org/

openSUSE Leap 15.1: new MozillaFirefox packages.
New packages are available:
  openSUSE Leap 15.1: MozillaFirefox 78.1.0-lp151.2.61.1

openSUSE Leap 15.1: new MozillaThunderbird packages.
New packages are available:
  openSUSE Leap 15.1: MozillaThunderbird 68.11.0-lp151.2.47.1

openSUSE Leap 15.1: new opera packages.
New packages are available:
  openSUSE Leap 15.1: opera 70.0.3728.71-lp151.2.24.1

openSUSE Leap 15.2: new MozillaFirefox packages (07/08/2020).
New packages are available:
  openSUSE Leap 15.2: MozillaFirefox 78.1.0-lp152.2.12.1

openSUSE Leap 15.2: new MozillaFirefox packages (13/08/2020).
New packages are available:
  openSUSE Leap 15.2: MozillaFirefox 78.1.0-lp152.2.15.1

openSUSE Leap 15.2: new MozillaThunderbird packages.
New packages are available:
  openSUSE Leap 15.2: MozillaThunderbird 68.11.0-lp152.2.7.1

openSUSE Leap 15.2: new opera packages.
New packages are available:
  openSUSE Leap 15.2: opera 70.0.3728.71-lp152.2.12.1

openSUSE Leap 15: new chromium packages.
New packages are available:
  openSUSE Leap 15.1: chromium 84.0.4147.89-lp151.2.109.1
  openSUSE Leap 15.2: chromium 84.0.4147.89-lp152.2.6.2

Opera: version 70.0.3728.71.
The version 70.0.3728.71 is fixed:
  https://www.opera.com/fr/computer/thanks?ni=stable&os=windows

Oracle Solaris: patch for third party software of July 2020 v3.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

RHEL 6.10: new chromium-browser packages.
New packages are available:
  RHEL 6.10: chromium-browser 84.0.4147.105-2.el6_10

RHEL 6.10: new firefox packages.
New packages are available:
  RHEL 6.10: firefox 68.11.0-1.el6_10

RHEL 7.8: new firefox packages.
New packages are available:
  RHEL 7.8: firefox 68.11.0-1.el7_8

RHEL 8.0: new firefox packages.
New packages are available:
  RHEL 8.0: firefox 68.11.0-1.el8_0

RHEL 8.1: new firefox packages.
New packages are available:
  RHEL 8.1: firefox 68.11.0-1.el8_1

RHEL 8.2: new firefox packages.
New packages are available:
  RHEL 8.2: firefox 68.11.0-1.el8_2

RHEL: new thunderbird packages.
New packages are available:
  RHEL 6.10: thunderbird 68.11.0-1.el6_10
  RHEL 7.8: thunderbird 68.11.0-1.el7_8
  RHEL 8.0: thunderbird 68.11.0-1.el8_0
  RHEL 8.1: thunderbird 68.11.0-1.el8_1
  RHEL 8.2: thunderbird 68.11.0-1.el8_2

Slackware: new mozilla-firefox packages.
New packages are available:
  Slackware 14.2: mozilla-firefox 68.11.0esr-*-1_slack14.2

Slackware: new mozilla-thunderbird packages.
New packages are available:
  Slackware 14.2: mozilla-thunderbird 68.11.0-*-1_slack14.2

SUSE LE 11 SP4: new MozillaFirefox packages.
New packages are available:
  SUSE LE 11 SP4: MozillaFirefox 78.1.0-78.87.1

SUSE LE 12: new MozillaFirefox packages.
New packages are available:
  SUSE LE 12 SP2: MozillaFirefox 78.1.0-112.8.1
  SUSE LE 12 SP3: MozillaFirefox 78.1.0-112.8.1
  SUSE LE 12 SP4: MozillaFirefox 78.1.0-112.8.1
  SUSE LE 12 SP5: MozillaFirefox 78.1.0-112.8.1

SUSE LE 15 SP1-2: new MozillaThunderbird packages.
New packages are available:
  SUSE LE 15 SP1: MozillaThunderbird 68.11.0-3.91.1
  SUSE LE 15 SP2: MozillaThunderbird 68.11.0-3.91.1

SUSE LE 15 SP1: new chromium packages.
New packages are available:
  SUSE LE 15 SP1: chromium 84.0.4147.89-bp151.3.94.1

SUSE LE 15 SP1: new MozillaFirefox packages.
New packages are available:
  SUSE LE 15 SP1: MozillaFirefox 78.1.0-3.100.2

SUSE LE 15 SP2: new chromium packages.
New packages are available:
  SUSE LE 15 SP2: chromium 84.0.4147.89-bp152.2.7.1

SUSE LE 15 SP2: new MozillaFirefox packages.
New packages are available:
  SUSE LE 15 SP2: MozillaFirefox 78.1.0-8.3.1

Ubuntu: new firefox packages.
New packages are available:
  Ubuntu 20.04 LTS: firefox 79.0+build1-0ubuntu0.20.04.1
  Ubuntu 18.04 LTS: firefox 79.0+build1-0ubuntu0.18.04.1
  Ubuntu 16.04 LTS: firefox 79.0+build1-0ubuntu0.16.04.2
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a computer vulnerability note. The Vigil@nce vulnerability database contains several thousand vulnerabilities.