9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.701 High
EPSS
Percentile
98.0%
Severity: Critical
Date : 2019-05-23
CVE-ID : CVE-2019-7317 CVE-2019-9800 CVE-2019-9814 CVE-2019-9816
CVE-2019-9817 CVE-2019-9819 CVE-2019-9820 CVE-2019-9821
CVE-2019-11691 CVE-2019-11692 CVE-2019-11693 CVE-2019-11695
CVE-2019-11696 CVE-2019-11697 CVE-2019-11698 CVE-2019-11699
CVE-2019-11701
Package : firefox
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-966
The package firefox before version 67.0-1 is vulnerable to multiple
issues including arbitrary code execution, access restriction bypass,
same-origin policy bypass, content spoofing, information disclosure,
cross-site scripting and denial of service.
Upgrade to 67.0-1.
The problems have been fixed upstream in version 67.0.
None.
png_image_free in png.c in libpng 1.6.36 has a use-after-free because
png_image_free_function is called under png_safe_execute.
Several memory safety bugs have been found in Firefox before 67.0 and
Thunderbird before 60.7.0. Some of these bugs showed evidence of memory
corruption and Mozilla presumes that with enough effort some of these
could be exploited to run arbitrary code.
Several memory safety bugs have been found in Firefox before 67.0. Some
of these bugs showed evidence of memory corruption and Mozilla presumes
that with enough effort some of these could be exploited to run
arbitrary code.
A possible vulnerability exists in Firefox before 67.0 and Thunderbird
before 60.7.0, where type confusion can occur when manipulating
JavaScript objects in object groups, allowing for the bypassing of
security checks within these groups. Note that this vulnerability has
only been demonstrated with UnboxedObjects, which are disabled by
default on all supported releases.
In Firefox before 67.0 and Thunderbird before 60.7.0, images from a
different domain can be read using a canvas object in some
circumstances. This could be used to steal image data from a different
site in violation of same-origin policy.
A vulnerability where a JavaScript compartment mismatch can occur in
Firefox before 67.0 and Thunderbird before 60.7.0, while working with
the fetch API, resulting in a potentially exploitable crash.
A use-after-free vulnerability can occur in the chrome event handler of
Firefox before 67.0 when it is freed while still in use. This results
in a potentially exploitable crash.
A use-after-free vulnerability can occur in AssertWorkerThread in
Firefox before 67.0, due to a race condition with shared workers. This
results in a potentially exploitable crash.
A use-after-free vulnerability can occur in Firefox before 67.0 and
Thunderbird before 60.7.0, when working with XMLHttpRequest (XHR) in an
event loop, causing the XHR main thread to be called after it has been
freed. This results in a potentially exploitable crash.
A use-after-free vulnerability can occur in Firefox before 67.0 and
Thunderbird before 60.7.0, when listeners are removed from the event
listener manager while still in use, resulting in a potentially
exploitable crash.
The bufferdata function in WebGL in Firefox before 67.0 and Thunderbird
before 60.7.0 is vulnerable to a buffer overflow with specific graphics
drivers on Linux. This could result in malicious content freezing a tab
or triggering a potentially exploitable crash.
In Firefox before 67.0, a custom cursor defined by scripting on a site
can position itself over the addressbar to spoof the actual cursor when
it should not be allowed outside of the primary web content area. This
could be used by a malicious site to trick users into clicking on
permission prompts, doorhanger notifications, or other buttons
inadvertently if the location is spoofed over the user interface.
In Firefox before 67.0, files with the .JNLP extension used for “Java
web start” applications are not treated as executable content for
download prompts even though they can be executed if Java is installed
on the local system. This could allow users to mistakenly launch an
executable binary locally.
In Firefox before 67.0, if the ALT and “a” keys are pressed when users
receive an extension installation prompt, the extension will be
installed without the install prompt delay that keeps the prompt
visible in order for users to accept or decline the installation. A
malicious web page could use this with spoofing on the page to trick
users into installing a malicious extension.
If a crafted hyperlink is dragged and dropped to the bookmark bar or
sidebar in Firefox before 67.0 or Thunderbird before 60.7.0, and the
resulting bookmark is subsequently dragged and dropped into the web
content area, an arbitrary query of a user’s browser history can be run
and transmitted to the content page via drop event data. This allows
for the theft of browser history by a malicious site.
A malicious page can briefly cause the wrong name to be highlighted as
the domain name in the addressbar during page navigations in Firefox
before 67.0. This could result in user confusion of which site is
currently loaded for spoofing attacks.
The default webcal: protocol handler in Firefox before 67.0 will load a
web site vulnerable to cross-site scripting (XSS) attacks. This default
was left in place as a legacy feature and has now been removed.
A remote attacker can crash the browser, access sensitive information,
bypass security measures or execute arbitrary code on the affected
host.
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
https://github.com/glennrp/libpng/issues/275
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9800
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540166%2C1534593%2C1546327%2C1540136%2C1538736%2C1538042%2C1535612%2C1499719%2C1499108%2C1538619%2C1535194%2C1516325%2C1542324%2C1542097%2C1532465%2C1533554%2C1541580
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9814
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1527592%2C1534536%2C1520132%2C1543159%2C1539393%2C1459932%2C1459182%2C1516425
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9816
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-9816
https://bugzilla.mozilla.org/show_bug.cgi?id=1536768
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9817
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-9817
https://bugzilla.mozilla.org/show_bug.cgi?id=1540221
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9819
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-9819
https://bugzilla.mozilla.org/show_bug.cgi?id=1532553
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9820
https://bugzilla.mozilla.org/show_bug.cgi?id=1536405
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9821
https://bugzilla.mozilla.org/show_bug.cgi?id=1539125
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11691
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11691
https://bugzilla.mozilla.org/show_bug.cgi?id=1542465
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11692
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11692
https://bugzilla.mozilla.org/show_bug.cgi?id=1544670
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11693
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11693
https://bugzilla.mozilla.org/show_bug.cgi?id=1532525
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11695
https://bugzilla.mozilla.org/show_bug.cgi?id=1445844
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11696
https://bugzilla.mozilla.org/show_bug.cgi?id=1392955
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11697
https://bugzilla.mozilla.org/show_bug.cgi?id=1440079
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11698
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11698
https://bugzilla.mozilla.org/show_bug.cgi?id=1543191
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11699
https://bugzilla.mozilla.org/show_bug.cgi?id=1528939
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11701
https://bugzilla.mozilla.org/show_bug.cgi?id=1518627
https://security.archlinux.org/CVE-2019-7317
https://security.archlinux.org/CVE-2019-9800
https://security.archlinux.org/CVE-2019-9814
https://security.archlinux.org/CVE-2019-9816
https://security.archlinux.org/CVE-2019-9817
https://security.archlinux.org/CVE-2019-9819
https://security.archlinux.org/CVE-2019-9820
https://security.archlinux.org/CVE-2019-9821
https://security.archlinux.org/CVE-2019-11691
https://security.archlinux.org/CVE-2019-11692
https://security.archlinux.org/CVE-2019-11693
https://security.archlinux.org/CVE-2019-11695
https://security.archlinux.org/CVE-2019-11696
https://security.archlinux.org/CVE-2019-11697
https://security.archlinux.org/CVE-2019-11698
https://security.archlinux.org/CVE-2019-11699
https://security.archlinux.org/CVE-2019-11701
bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
bugzilla.mozilla.org/buglist.cgi?bug_id=1527592%2C1534536%2C1520132%2C1543159%2C1539393%2C1459932%2C1459182%2C1516425
bugzilla.mozilla.org/buglist.cgi?bug_id=1540166%2C1534593%2C1546327%2C1540136%2C1538736%2C1538042%2C1535612%2C1499719%2C1499108%2C1538619%2C1535194%2C1516325%2C1542324%2C1542097%2C1532465%2C1533554%2C1541580
bugzilla.mozilla.org/show_bug.cgi?id=1392955
bugzilla.mozilla.org/show_bug.cgi?id=1440079
bugzilla.mozilla.org/show_bug.cgi?id=1445844
bugzilla.mozilla.org/show_bug.cgi?id=1518627
bugzilla.mozilla.org/show_bug.cgi?id=1528939
bugzilla.mozilla.org/show_bug.cgi?id=1532525
bugzilla.mozilla.org/show_bug.cgi?id=1532553
bugzilla.mozilla.org/show_bug.cgi?id=1536405
bugzilla.mozilla.org/show_bug.cgi?id=1536768
bugzilla.mozilla.org/show_bug.cgi?id=1539125
bugzilla.mozilla.org/show_bug.cgi?id=1540221
bugzilla.mozilla.org/show_bug.cgi?id=1542465
bugzilla.mozilla.org/show_bug.cgi?id=1543191
bugzilla.mozilla.org/show_bug.cgi?id=1544670
github.com/glennrp/libpng/issues/275
security.archlinux.org/AVG-966
security.archlinux.org/CVE-2019-11691
security.archlinux.org/CVE-2019-11692
security.archlinux.org/CVE-2019-11693
security.archlinux.org/CVE-2019-11695
security.archlinux.org/CVE-2019-11696
security.archlinux.org/CVE-2019-11697
security.archlinux.org/CVE-2019-11698
security.archlinux.org/CVE-2019-11699
security.archlinux.org/CVE-2019-11701
security.archlinux.org/CVE-2019-7317
security.archlinux.org/CVE-2019-9800
security.archlinux.org/CVE-2019-9814
security.archlinux.org/CVE-2019-9816
security.archlinux.org/CVE-2019-9817
security.archlinux.org/CVE-2019-9819
security.archlinux.org/CVE-2019-9820
security.archlinux.org/CVE-2019-9821
www.mozilla.org/en-US/security/advisories/mfsa2019-13/
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11691
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11692
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11693
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11695
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11696
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11697
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11698
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11699
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11701
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9800
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9814
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9816
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9817
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9819
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9820
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9821
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11691
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11692
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11693
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11698
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-9816
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-9817
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-9819
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.701 High
EPSS
Percentile
98.0%