Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mozilla Firefox Security Advisory (MFSA2020-54) - Linux

Information

Severity

Severity

High

Family

Family

General

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

2 years ago

Modified

Modified

2 years ago

Summary

This host is missing a security update for Mozilla Firefox.

Insight

Insight

CVE-2020-16042: Operations on a BigInt could have caused uninitialized memory to be exposed When a BigInt was right-shifted the backing store was not properly cleared, allowing uninitialized memory to be read. CVE-2020-26971: Heap buffer overflow in WebGL Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. CVE-2020-26972: Use-After-Free in WebGL The lifecycle of IPC Actors allows managed actors to outlive their manager actors, and the former must ensure that they are not attempting to use a dead actor they have a reference to. Such a check was omitted in WebGL, resulting in a use-after-free and a potentially exploitable crash. CVE-2020-26973: CSS Sanitizer performed incorrect sanitization Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. CVE-2020-26974: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. CVE-2020-26975: Malicious applications on Android could have induced Firefox for Android into sending arbitrary attacker-specified headers When a malicious application installed on the user's device broadcast an Intent to Firefox for Android, arbitrary headers could have been specified, leading to attacks such as abusing ambient authority or session fixation. This was resolved by only allowing certain safe-listed headers.Note: This issue only affected Firefox for Android. Other operating systems are unaffected. CVE-2020-26976: HTTPS pages could have been intercepted by a registered service worker when they should not have been When a HTTPS pages was embedded in a HTTP page, and there was a service worker registered for the former, the service worker could have intercepted the request for the secure page despite the iframe not being a secure context due to the (insecure) framing. CVE-2020-26977: URL spoofing via unresponsive port in Firefox for Android By attempting to connect a website using an unresponsive port, an attacker could have controlled the content of a tab while the URL bar displayed the original domain. Note: This issue only affects Firefox for Android. Other operating systems are unaffected. CVE-2020-26978: Internal network hosts could have been probed by a malicious webpage Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. CVE-2020-26979: When entering an address in the address or search bars, a website could have redirected the user before they were navigated to the intended url When a user typed a URL ... [Please see the references for more information on the vulnerabilities]

Affected Software

Affected Software

Firefox version(s) below 84.

Detection Method

Detection Method

Checks if a vulnerable package version is present on the target host.

Solution

Solution

The vendor has released an update. Please see the reference(s) for more information.