Vulnerability Details

Mozilla Firefox Security Updates(mfsa_2019-25_2019-27)-Mac OS X

Published: 2019-09-05 07:30:57
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:

This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
Multiple flaws exists due to, - Memory safety bugs. - Multiple use-after-free errors. - A same-origin policy violation. - Sandbox escape through Firefox Sync. - A compromised sandboxed content process. - Navigation events were not fully adhering to the W3C's 'Navigation-Timing Level 2' draft specification in some instances for the unload event. - A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints. - An out-of-bounds read vulnerability exists in the Skia graphics library. - A type confusion vulnerability exists in Spidermonkey. - Content security policy directives ignore port and path if host is a wildcard. - Content security policy bypass through hash-based sources in directives. - 'Forget about this site' removes sites from pre-loaded HSTS list.

Successful exploitation allow attackers to cause denial of service, escalate privileges, conduct cross site scripting attacks and disclose sensitive information.

Affected Versions:
Mozilla Firefox version before 69 on Mac OS X.

Upgrade to Mozilla Firefox version 69 or later. Please see the references for more information.

Solution Type:
Vendor Patch

Detection Type:

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)


CVSS Score

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.