CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
71.7%
An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin (CVE-2022-38472). A cross-origin iframe referencing an XSLT document would inherit the parent domain’s permissions (such as microphone or camera access) (CVE-2022-38473). Members the Mozilla Fuzzing Team reported memory safety bugs present in Firefox ESR 91.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code (CVE-2022-38478).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 8 | noarch | firefox | < 91.13.0-1 | firefox-91.13.0-1.mga8 |
Mageia | 8 | noarch | firefox-l10n | < 91.13.0-1 | firefox-l10n-91.13.0-1.mga8 |
Mageia | 8 | noarch | nspr | < 4.34.1-1 | nspr-4.34.1-1.mga8 |
Mageia | 8 | noarch | nss | < 3.82.0-1 | nss-3.82.0-1.mga8 |
access.redhat.com/errata/RHSA-2022:6174
bugs.mageia.org/show_bug.cgi?id=30765
firefox-source-docs.mozilla.org/security/nss/releases/nss_3_82.html
groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/oOKOnyGPMQQ
groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/uceBXfAG1pM
www.mozilla.org/en-US/security/advisories/mfsa2022-35/