The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
71.0+build5-0ubuntu0.16.04.11:68.7.0+build1-0ubuntu0.16.04.271.0+build5-0ubuntu0.18.04.138.8.0~repack1-0ubuntu138.8.0~repack1-0ubuntu338.8.0~repack1-0ubuntu452.3.1-0ubuntu352.3.1-7fakesync152.8.1-0ubuntu0.18.04.152.9.1-0ubuntu0.18.04.11:68.4.1+build1-0ubuntu0.18.04.171.0+build5-0ubuntu152.9.1-1build152.9.1-1ubuntu31:68.3.0+build2-0ubuntu1Exploitability
AV:NAC:LPR:NUI:RScope
S:UImpact
C:HI:HA:HCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H