Lucene search

K
redosRedosROS-20230505-02
HistoryMay 05, 2023 - 12:00 a.m.

ROS-20230505-02

2023-05-0500:00:00
redos.red-soft.ru
3

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

40.6%

The vulnerability in the Mozilla Firefox browser is due to the fact that Mozilla’s service desk handles blocking
records when downloading updates from an SMB server. Exploitation of the vulnerability could allow an attacker to
to apply an unsigned update file by pointing the service to an update file on a malicious SMB server.

A vulnerability in the Mozilla Firefox browser is related to a bounds error during garbage collector compression.
Exploitation of the vulnerability could allow an attacker acting remotely, creating a specially crafted
website, trick the victim into opening it, cause memory corruption, and execute arbitrary code
on the target system.

A vulnerability in the Mozilla Firefox browser is related to incorrect processing of user data.
Exploitation of the vulnerability could allow an attacker acting remotely to hide a full-screen notification using the window.open combination.
notification using a combination of window.open, full-screen requests, window.name assignments, and setInterval calls.
setInterval.

A vulnerability in the Mozilla Firefox browser involves an invalid free operation from JavaScript code.
Exploitation of the vulnerability could allow an attacker acting remotely to force a victim to visit a specially crafted web page, invoke a JavaScript call to setInterval.
a specially crafted web page, cause memory corruption, and execute arbitrary code.

A vulnerability in the Mozilla Firefox browser involves improper handling of a newline in a filename.
Exploitation of the vulnerability could allow an attacker acting remotely to bypass the security mechanisms of
file extension security mechanisms that replace dangerous file extensions such as .lnk with .download, potentially compromising a vulnerable system.
potentially compromise a vulnerable system.

The vulnerability in the Mozilla Firefox browser involves improper handling of filenames ending in .desktop.
.desktop. Exploitation of the vulnerability could allow an attacker acting remotely to trick a victim into downloading a malicious file.
the victim to download a malicious file and run it on the system.

The vulnerability in the Mozilla Firefox browser is related to a boundary bug in the Safe Browsing API. Exploitation
of the vulnerability could allow an attacker acting remotely to create a customized website,
trick the victim into opening it, cause memory corruption, and execute arbitrary code on the target system.
system.

The vulnerability in the Mozilla Firefox browser is related to the use of an incorrect downgrade instruction in the
ARM64 Ion compiler. Exploitation of the vulnerability could allow an attacker acting remotely,
to gain access to sensitive information.

Vulnerability in Mozilla Firefox browser is related to a boundary error when processing unreliable input data
in the WebGL API. Exploitation of the vulnerability could allow a remote attacker to trick a victim into visiting a specially crafted website.
victim to visit a specially crafted website, initiate an out-of-bounds entry, and execute
arbitrary code on the target system.

The vulnerability in the Mozilla Firefox browser is related to a boundary error when analyzing HTML content. Exploitation of the
of the vulnerability could allow an attacker acting remotely to create a customized website,
trick the victim into opening it, cause memory corruption, and execute arbitrary code on the target system.
system.

The vulnerability in the Mozilla Firefox browser is related to excessive data output by the application when downloading files
via “Save Link As” in Windows with suggested file names containing the names of environment variables.
environment. Exploitation of the vulnerability could allow an attacker acting remotely to gain
unauthorized access to sensitive information on the system.

The vulnerability in Mozilla Firefox browser is related to improper handling of the file name directive in the
Content-Disposition, which leads to file name truncation if it contains the NULL character. Exploitation
the vulnerability could allow an attacker acting remotely to abuse this behavior and force a victim to download a malicious file.
the victim to download a malicious file.

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64firefox<= 102.10.0-1UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

40.6%