Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Mozilla Firefox Security Advisory (MFSA2019-25) - Linux
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is missing a security update for Mozilla Firefox.
Insight
Insight
CVE-2019-11751: Malicious code execution through command line parameters Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder. Note: this issue only affects Firefox on Windows operating systems. CVE-2019-11746: Use-after-free while manipulating video A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. CVE-2019-11744: XSS by breaking out of title and textarea elements using innerHTML Some HTML elements, such as <title> and <textarea>, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. CVE-2019-11742: Same-origin policy violation with SVG filters and canvas to steal cross-origin images A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a <canvas> element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. CVE-2019-11736: File manipulation and privilege escalation in Mozilla Maintenance Service The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected. CVE-2019-11753: Privilege escalation with Mozilla Maintenance Service in custom Firefox installation location The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced ... [Please see the references for more information on the vulnerabilities]
Affected Software
Affected Software
Firefox version(s) below 69.
Detection Method
Detection Method
Checks if a vulnerable package version is present on the target host.
Solution
Solution
The vendor has released an update. Please see the reference(s) for more information.
Common Vulnerabilities and Exposures (CVE)
- CVE-2019-11734
- CVE-2019-11735
- CVE-2019-11736
- CVE-2019-11737
- CVE-2019-11738
- CVE-2019-11740
- CVE-2019-11741
- CVE-2019-11742
- CVE-2019-11743
- CVE-2019-11744
- CVE-2019-11746
- CVE-2019-11747
- CVE-2019-11748
- CVE-2019-11749
- CVE-2019-11750
- CVE-2019-11751
- CVE-2019-11752
- CVE-2019-11753
- CVE-2019-11758
- CVE-2019-5849
- CVE-2019-9812
References
- https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1352875%2C1557208%2C15
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1561404%2C1561484%2C15
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1563133%2C1573160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1388015
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452037
- https://bugzilla.mozilla.org/show_bug.cgi?id=1501152
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536227
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538008
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538015
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539595
- https://bugzilla.mozilla.org/show_bug.cgi?id=1551913
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552206
- https://bugzilla.mozilla.org/show_bug.cgi?id=1555838
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559715
- https://bugzilla.mozilla.org/show_bug.cgi?id=1560495
- https://bugzilla.mozilla.org/show_bug.cgi?id=1562033
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564449
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564481
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564588
- https://bugzilla.mozilla.org/show_bug.cgi?id=1565374
- https://bugzilla.mozilla.org/show_bug.cgi?id=1568397
- https://bugzilla.mozilla.org/show_bug.cgi?id=1572838
- https://bugzilla.mozilla.org/show_bug.cgi?id=1574980
- https://w3c.github.io/navigation-timing