CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
65.4%
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. (CVE-2023-29537,
CVE-2023-29540, CVE-2023-29543, CVE-2023-29544, CVE-2023-29547,
CVE-2023-29548, CVE-2023-29549, CVE-2023-29550, CVE-2023-29551)
Irvan Kurniawan discovered that Firefox did not properly manage fullscreen
notifications using a combination of window.open, fullscreen requests,
window.name assignments, and setInterval calls. An attacker could
potentially exploit this issue to perform spoofing attacks. (CVE-2023-29533)
Lukas Bernhard discovered that Firefox did not properly manage memory
when doing Garbage Collector compaction. An attacker could potentially
exploits this issue to cause a denial of service. (CVE-2023-29535)
Zx from qriousec discovered that Firefox did not properly validate the
address to free a pointer provided to the memory manager. An attacker could
potentially exploits this issue to cause a denial of service.
(CVE-2023-29536)
Alexis aka zoracon discovered that Firefox did not properly validate the
URI received by the WebExtension during a load request. An attacker could
potentially exploits this to obtain sensitive information. (CVE-2023-29538)
Trung Pham discovered that Firefox did not properly validate the filename
directive in the Content-Disposition header. An attacker could possibly
exploit this to perform reflected file download attacks potentially
tricking users to install malware. (CVE-2023-29539)
Ameen Basha M K discovered that Firefox did not properly validate downloads
of files ending in .desktop. An attacker could potentially exploits this
issue to execute arbitrary code. (CVE-2023-29541)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.04 | noarch | firefox | < 112.0+build2-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-dbg | < 112.0+build2-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-dev | < 112.0+build2-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-geckodriver | < 112.0+build2-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-af | < 112.0+build2-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-an | < 112.0+build2-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-ar | < 112.0+build2-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-as | < 112.0+build2-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-ast | < 112.0+build2-0ubuntu0.20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-az | < 112.0+build2-0ubuntu0.20.04.1 | UNKNOWN |
ubuntu.com/security/CVE-2023-29533
ubuntu.com/security/CVE-2023-29535
ubuntu.com/security/CVE-2023-29536
ubuntu.com/security/CVE-2023-29537
ubuntu.com/security/CVE-2023-29538
ubuntu.com/security/CVE-2023-29539
ubuntu.com/security/CVE-2023-29540
ubuntu.com/security/CVE-2023-29541
ubuntu.com/security/CVE-2023-29543
ubuntu.com/security/CVE-2023-29544
ubuntu.com/security/CVE-2023-29547
ubuntu.com/security/CVE-2023-29548
ubuntu.com/security/CVE-2023-29549
ubuntu.com/security/CVE-2023-29550
ubuntu.com/security/CVE-2023-29551