Lucene search

K
redhatRedHatRHSA-2021:1362
HistoryApr 26, 2021 - 10:29 a.m.

(RHSA-2021:1362) Important: firefox security update

2021-04-2610:29:17
CWE-190
access.redhat.com
148
mozilla firefox
open-source
web browser
standards compliance
performance
portability
security update
out of bound write
responsive design mode
network hosts
secure lock icon
blob urls
arbitrary ftp command execution
webassembly jit
port blocking
cve-2021-23994
cve-2021-23995
cve-2021-23961
cve-2021-23998
cve-2021-23999
cve-2021-24002
cve-2021-29945
cve-2021-29946
unix

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.009

Percentile

82.4%

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 78.10.0 ESR.

Security Fix(es):

  • Mozilla: Out of bound write due to lazy initialization (CVE-2021-23994)

  • Mozilla: Use-after-free in Responsive Design Mode (CVE-2021-23995)

  • Mozilla: More internal network hosts could have been probed by a malicious webpage (CVE-2021-23961)

  • Mozilla: Secure Lock icon could have been spoofed (CVE-2021-23998)

  • Mozilla: Blob URLs may have been granted additional privileges (CVE-2021-23999)

  • Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL (CVE-2021-24002)

  • Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads (CVE-2021-29945)

  • Mozilla: Port blocking could be bypassed (CVE-2021-29946)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected configurations

Vulners
Node
redhatthunderbirdRange78.10.0-1.el7_9
OR
redhatfirefoxRange78.10.0-1.el7_9
OR
redhatthunderbirdRange78.10.0-1.el8_3
OR
redhatfirefoxRange78.10.0-1.el8_3
OR
redhatthunderbird-0Range78.10.0-1.el8_1
OR
redhatfirefox-0Range78.10.0-1.el8_1
OR
redhatthunderbird-0Range78.10.0-1.el8_2
OR
redhatfirefox-0Range78.10.0-1.el8_2
AND
redhatenterprise_linuxMatch7
OR
redhatenterprise_linuxMatch8
VendorProductVersionCPE
redhatthunderbird*cpe:2.3:a:redhat:thunderbird:*:*:*:*:*:*:*:*
redhatfirefox*cpe:2.3:a:redhat:firefox:*:*:*:*:*:*:*:*
redhatthunderbird-0*cpe:2.3:a:redhat:thunderbird-0:*:*:*:*:*:*:*:*
redhatfirefox-0*cpe:2.3:a:redhat:firefox-0:*:*:*:*:*:*:*:*
redhatenterprise_linux7cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*
redhatenterprise_linux8cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.009

Percentile

82.4%