Lucene search

K
redosRedosROS-20220701-02
HistoryJul 01, 2022 - 12:00 a.m.

ROS-20220701-02

2022-07-0100:00:00
redos.red-soft.ru
18

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

71.8%

A vulnerability in the Mozilla Firefox browser is related to improper handling of the CSP sandbox header without the
the “allow scripts” parameter. Exploitation of the vulnerability could allow an attacker acting remotely to use an iframe to bypass an implemented CSP restriction and exploit it.
remotely, use an iframe to bypass the implemented CSP restriction and execute scripts if the
a user clicks on a javascript link

The vulnerability in the Mozilla Firefox browser is related to an integer overflow in the function
nsTArray_Impl::ReplaceElementsAt(). Exploitation of the vulnerability could allow an attacker acting
remotely, force a victim to visit a specially crafted website, trigger an integer overflow, and
execute arbitrary code on the target system

A vulnerability in the Mozilla Firefox browser is related to a boundary error in HTML content processing.
Exploitation of the vulnerability could allow an attacker acting remotely to create a customized website,
trick the victim into opening it, cause memory corruption, and execute arbitrary code on the target system.
system

A vulnerability in the Mozilla Firefox browser is related to improper error handling when processing an inaccessible
PAC file. Exploitation of the vulnerability could allow an attacker acting remotely to specify the URL of the
PAC, and then if the server hosting the PAC is unavailable, OCSP requests are blocked, resulting in the
incorrect error pages being displayed.

The vulnerability in Mozilla Firefox browser is related to improper handling of the resize event of a
of a pop-up window. Exploitation of the vulnerability could allow an attacker acting remotely to create a
a special website that could create a resized pop-up window to overlay its own content and address bar with its own content.
address bar with their own content and perform a spoofing attack

The vulnerability in the Mozilla Firefox browser is related to a bug in the handling of CSS stylesheets accessible via the
internal URIs as “resource:”. Exploitation of the vulnerability could allow an attacker acting
remotely to bypass the implemented content security policy

The vulnerability in the Mozilla Firefox browser is related to improper input validation when processing attributes of the
JavaScript. Exploitation of the vulnerability could allow an attacker acting remotely to pass unwanted attributes to a JavaScript object.
unwanted attributes to a JavaScript object, execute a prototype infection, and execute arbitrary
JavaScript in the browser

The vulnerability in Mozilla Firefox browser is related to a memory freeing bug in nsSHistory when processing
XML documents. Exploitation of the vulnerability could allow an attacker acting remotely to trigger a
a post-release usage error and execute arbitrary code on the system

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64firefox<= 91.11.0-1UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

71.8%