Lucene search

K
redosRedosROS-20221007-05
HistoryOct 07, 2022 - 12:00 a.m.

ROS-20221007-05

2022-10-0700:00:00
redos.red-soft.ru
22

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

59.4%

Firefox browser vulnerability is related to a bounds error in HTML content processing. Exploitation
The vulnerability could allow a remote attacker to create a customized website, trick the victim into opening it, cause memory corruption, and execute arbitrary code on the target system.
the victim to open it, cause memory corruption, and execute arbitrary code on the target system

The Firefox browser vulnerability is related to incorrect initialization of FeaturePolicy on all pages during iframe navigation.
during iframe navigation. Exploitation of the vulnerability could allow an attacker acting remotely,
trick the victim into opening a specially crafted website, bypassing FeaturePolicy restrictions, and
force the browser to pass device permissions to insecure attached documents

The vulnerability in the Firefox, Firefox ESR web browsers and Thunderbird email client is related to errors in the
in the presentation of information by the user interface. Exploitation of the vulnerability could allow
An attacker acting remotely could disclose protected information

Vulnerability in the SpiderMonkey JavaScript script handler of Firefox, Firefox ESR and Thunderbird email client is related to copying errors in the user interface.
Thunderbird email client is related to buffer copying without checking input data size. Exploitation
the vulnerability could allow a remote attacker to execute arbitrary code by opening a specially crafted malicious web application.
A specially crafted malicious web page

PK11_ChangePW vulnerability in Mozilla Firefox browser, Thunderbird email client is related to memory usage after its release.
memory usage after it is freed. Exploitation of the vulnerability could allow an attacker,
acting remotely, to cause a denial of service

A vulnerability in the Firefox browser is related to the fact that some requests can ignore base-uri settings
CSP when processing the injection of basic HTML elements. Exploitation of the vulnerability could allow an attacker,
acting remotely, to force the browser to accept the base of the injected element instead of the source code, which would
Bypass content security policy

Vulnerability in the implementation of the XSLT (eXtensible Stylesheet Language Transformations) technology of the email client
Thunderbird, Firefox and Firefox ESR browsers is related to incorrect restriction of visualized layers or frames.
frames. Exploitation of the vulnerability could allow an attacker acting remotely to escalate their
privileges

Firefox browser vulnerability is related to insufficient cleansing of user data when visiting
directory listings for chrome:// URLs as source. Exploitation of the vulnerability could
allow an attacker acting remotely to execute arbitrary HTML code and script in the browser of a
of a user in the context of a vulnerable website

The Firefox browser vulnerability is related to a post-release exploitation error caused by the simultaneous
use of a URL parser with non-UTF-8 data. Exploitation of the vulnerability
could allow an attacker acting remotely to force a victim to visit a specially crafted
website, cause a post-release usage error, and execute arbitrary code on the system

Vulnerability in the XSLT (eXtensible Stylesheet Language Transformations) implementation of the Firefox browser
and Thunderbird mail client is related to incorrect operation of the user interface when the address bar
processing content in the address bar. Exploitation of the vulnerability could allow an attacker acting remotely to spoof the address bar.
remotely to conduct spoofing attacks

Firefox browser vulnerability is related to insufficient input data validation when processing values of array elements.
of array elements. Exploitation of the vulnerability could allow a remote attacker to bypass security restrictions.
security restrictions

Firefox browser vulnerability is related to inconsistency of data in instructions and data cache when creating the
wasm code. Exploitation of the vulnerability could allow a remote attacker to trick a victim into opening a specially crafted web page.
a victim to open a specially crafted web page, cause memory corruption, and possibly execute an
arbitrary code

A vulnerability in the Firefox browser is related to improper cookie handling. Exploitation of the vulnerability
could allow an attacker, acting remotely and with access to a shared subdomain, to inject cookies with certain special characters.
cookies with certain special characters, bypass the safe context restriction for cookies with the __Host prefix.
__Host and __Secure prefix cookies and overwrite those cookies, which could lead to session-locking attacks.
session hijacking

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64firefox<= 102.3.0-1UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

59.4%