8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
77.4%
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code.(CVE-2023-6865,
CVE-2023-6857, CVE-2023-6858, CVE-2023-6859, CVE-2023-6866, CVE-2023-6867,
CVE-2023-6861, CVE-2023-6869, CVE-2023-6871, CVE-2023-6872, CVE-2023-6863,
CVE-2023-6864, CVE-2023-6873)
DoHyun Lee discovered that Firefox did not properly manage memory when used
on systems with the Mesa VM driver. An attacker could potentially exploit
this issue to execute arbitrary code. (CVE-2023-6856)
George Pantela and Hubert Kario discovered that Firefox using multiple NSS
NIST curves which were susceptible to a side-channel attack known as
“Minerva”. An attacker could potentially exploit this issue to obtain
sensitive information. (CVE-2023-6135)
Andrew Osmond discovered that Firefox did not properly validate the textures
produced by remote decoders. An attacker could potentially exploit this
issue to escape the sandbox. (CVE-2023-6860)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.04 | noarch | firefox | < 121.0+build1-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-dbg | < 121.0+build1-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-dev | < 121.0+build1-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-geckodriver | < 121.0+build1-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-af | < 121.0+build1-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-an | < 121.0+build1-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-ar | < 121.0+build1-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-as | < 121.0+build1-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-ast | < 121.0+build1-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-az | < 121.0+build1-0ubuntu0.20.04.1 | UNKNOWN |
ubuntu.com/security/CVE-2023-6135
ubuntu.com/security/CVE-2023-6856
ubuntu.com/security/CVE-2023-6857
ubuntu.com/security/CVE-2023-6858
ubuntu.com/security/CVE-2023-6859
ubuntu.com/security/CVE-2023-6860
ubuntu.com/security/CVE-2023-6861
ubuntu.com/security/CVE-2023-6863
ubuntu.com/security/CVE-2023-6864
ubuntu.com/security/CVE-2023-6865
ubuntu.com/security/CVE-2023-6866
ubuntu.com/security/CVE-2023-6867
ubuntu.com/security/CVE-2023-6869
ubuntu.com/security/CVE-2023-6871
ubuntu.com/security/CVE-2023-6872
ubuntu.com/security/CVE-2023-6873
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
77.4%