Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Mozilla Firefox Security Advisory (MFSA2020-54) - Linux
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is missing a security update for Mozilla Firefox.
Insight
Insight
CVE-2020-16042: Operations on a BigInt could have caused uninitialized memory to be exposed When a BigInt was right-shifted the backing store was not properly cleared, allowing uninitialized memory to be read. CVE-2020-26971: Heap buffer overflow in WebGL Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. CVE-2020-26972: Use-After-Free in WebGL The lifecycle of IPC Actors allows managed actors to outlive their manager actors, and the former must ensure that they are not attempting to use a dead actor they have a reference to. Such a check was omitted in WebGL, resulting in a use-after-free and a potentially exploitable crash. CVE-2020-26973: CSS Sanitizer performed incorrect sanitization Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. CVE-2020-26974: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. CVE-2020-26975: Malicious applications on Android could have induced Firefox for Android into sending arbitrary attacker-specified headers When a malicious application installed on the user's device broadcast an Intent to Firefox for Android, arbitrary headers could have been specified, leading to attacks such as abusing ambient authority or session fixation. This was resolved by only allowing certain safe-listed headers.Note: This issue only affected Firefox for Android. Other operating systems are unaffected. CVE-2020-26976: HTTPS pages could have been intercepted by a registered service worker when they should not have been When a HTTPS pages was embedded in a HTTP page, and there was a service worker registered for the former, the service worker could have intercepted the request for the secure page despite the iframe not being a secure context due to the (insecure) framing. CVE-2020-26977: URL spoofing via unresponsive port in Firefox for Android By attempting to connect a website using an unresponsive port, an attacker could have controlled the content of a tab while the URL bar displayed the original domain. Note: This issue only affects Firefox for Android. Other operating systems are unaffected. CVE-2020-26978: Internal network hosts could have been probed by a malicious webpage Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. CVE-2020-26979: When entering an address in the address or search bars, a website could have redirected the user before they were navigated to the intended url When a user typed a URL ... [Please see the references for more information on the vulnerabilities]
Affected Software
Affected Software
Firefox version(s) below 84.
Detection Method
Detection Method
Checks if a vulnerable package version is present on the target host.
Solution
Solution
The vendor has released an update. Please see the reference(s) for more information.
Common Vulnerabilities and Exposures (CVE)
References
- https://www.mozilla.org/en-US/security/advisories/mfsa2020-54/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1607449%2C1640416%2C16
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1641287%2C1673299
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664831%2C1673589
- https://bugzilla.mozilla.org/show_bug.cgi?id=1657916
- https://bugzilla.mozilla.org/show_bug.cgi?id=1661071
- https://bugzilla.mozilla.org/show_bug.cgi?id=1661365
- https://bugzilla.mozilla.org/show_bug.cgi?id=1663466
- https://bugzilla.mozilla.org/show_bug.cgi?id=1671382
- https://bugzilla.mozilla.org/show_bug.cgi?id=1674343
- https://bugzilla.mozilla.org/show_bug.cgi?id=1676311
- https://bugzilla.mozilla.org/show_bug.cgi?id=1677047
- https://bugzilla.mozilla.org/show_bug.cgi?id=1679003
- https://bugzilla.mozilla.org/show_bug.cgi?id=1680084
- https://bugzilla.mozilla.org/show_bug.cgi?id=1681022