Vulnerability Details

Mozilla Firefox Security Updates(mfsa_2019-25_2019-27)-Windows

Published: 2019-09-05 05:57:52
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary:
This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
Multiple flaws exists due to, - Memory safety bugs. - Logging-related command line parameters are not properly sanitized. - Multiple use-after-free errors. - A same-origin policy violation. - The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory. - Privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. - Sandbox escape through Firefox Sync. - A compromised sandboxed content process. - Navigation events were not fully adhering to the W3C's 'Navigation-Timing Level 2' draft specification in some instances for the unload event. - A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints. - An out-of-bounds read vulnerability exists in the Skia graphics library. - A type confusion vulnerability exists in Spidermonkey. - Content security policy directives ignore port and path if host is a wildcard. - Content security policy bypass through hash-based sources in directives. - 'Forget about this site' removes sites from pre-loaded HSTS list.

Impact:
Successful exploitation allow attackers to cause denial of service, escalate privileges, conduct cross site scripting attacks and disclose sensitive information.

Affected Versions:
Mozilla Firefox version before 69 on Windows.

Recommendations:
Upgrade to Mozilla Firefox version 69 or later. Please see the references for more information.

Solution Type:
Vendor Patch

Detection Type:
Windows Registry

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-11751
https://nvd.nist.gov/vuln/detail/CVE-2019-11746
https://nvd.nist.gov/vuln/detail/CVE-2019-11744
https://nvd.nist.gov/vuln/detail/CVE-2019-11742
https://nvd.nist.gov/vuln/detail/CVE-2019-11736
https://nvd.nist.gov/vuln/detail/CVE-2019-11753
https://nvd.nist.gov/vuln/detail/CVE-2019-11752
https://nvd.nist.gov/vuln/detail/CVE-2019-9812
https://nvd.nist.gov/vuln/detail/CVE-2019-11741
https://nvd.nist.gov/vuln/detail/CVE-2019-11743
https://nvd.nist.gov/vuln/detail/CVE-2019-11748
https://nvd.nist.gov/vuln/detail/CVE-2019-11749
https://nvd.nist.gov/vuln/detail/CVE-2019-5849
https://nvd.nist.gov/vuln/detail/CVE-2019-11750
https://nvd.nist.gov/vuln/detail/CVE-2019-11737
https://nvd.nist.gov/vuln/detail/CVE-2019-11738
https://nvd.nist.gov/vuln/detail/CVE-2019-11747
https://nvd.nist.gov/vuln/detail/CVE-2019-11734
https://nvd.nist.gov/vuln/detail/CVE-2019-11735
https://nvd.nist.gov/vuln/detail/CVE-2019-11740

References:

https://www.mozilla.org/en-US/security/advisories/mfsa2019-25
https://www.mozilla.org/en-US/firefox/new/

Search
Severity
High
CVSS Score
10.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.