Lucene search

K
ubuntuUbuntuUSN-6201-1
HistoryJul 05, 2023 - 12:00 a.m.

Firefox vulnerabilities

2023-07-0500:00:00
ubuntu.com
28
firefox
ubuntu 20.04 lts
multiple vulnerabilities
denial of service
sensitive information
arbitrary code
tracking data
cross-domain
drag and drop api
spoofing attacks
filesystem api
diagcab files

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.8%

Releases

  • Ubuntu 20.04 LTS

Packages

  • firefox - Mozilla Open Source web browser

Details

Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. (CVE-2023-37201,
CVE-2023-37202, CVE-2023-37205, CVE-2023-37207, CVE-2023-37209,
CVE-2023-37210, CVE-2023-37211, CVE-2023-37212)

Martin Hostettler discovered that Firefox did not properly block storage of
all cookies when configured. An attacker could potentially exploits this
issue to store tracking data without permission in localstorage.
(CVE-2023-3482)

Paul Nickerson discovered that Firefox did have insufficient validation in
the Drag and Drop API. If a user were tricked into creating a shortcut to
local system files, an attacker could execute arbitrary code.
(CVE-2023-37203)

Irvan Kurniawan discovered that Firefox did not properly manage fullscreen
notifications using an option element having an expensive computational
function. An attacker could potentially exploit this issue to perform
spoofing attacks. (CVE-2023-37204)

Ameen Basha M K discovered that Firefox did not properly validate symlinks
in the FileSystem API. If a user were tricked into uploading a symlinked
file to a malicious website, an attacker could obtain sensitive information.
(CVE-2023-37206)

Puf discovered that Firefox did not properly provide warning when opening
Diagcab files. If a user were tricked into opening a malicicous Diagcab
file, an attacker could execute arbitrary code. (CVE-2023-37208)

OSVersionArchitecturePackageVersionFilename
Ubuntu20.04noarchfirefox< 115.0+build2-0ubuntu0.20.04.3UNKNOWN
Ubuntu20.04noarchfirefox-dbg< 115.0+build2-0ubuntu0.20.04.3UNKNOWN
Ubuntu20.04noarchfirefox-dev< 115.0+build2-0ubuntu0.20.04.3UNKNOWN
Ubuntu20.04noarchfirefox-geckodriver< 115.0+build2-0ubuntu0.20.04.3UNKNOWN
Ubuntu20.04noarchfirefox-locale-af< 115.0+build2-0ubuntu0.20.04.3UNKNOWN
Ubuntu20.04noarchfirefox-locale-an< 115.0+build2-0ubuntu0.20.04.3UNKNOWN
Ubuntu20.04noarchfirefox-locale-ar< 115.0+build2-0ubuntu0.20.04.3UNKNOWN
Ubuntu20.04noarchfirefox-locale-as< 115.0+build2-0ubuntu0.20.04.3UNKNOWN
Ubuntu20.04noarchfirefox-locale-ast< 115.0+build2-0ubuntu0.20.04.3UNKNOWN
Ubuntu20.04noarchfirefox-locale-az< 115.0+build2-0ubuntu0.20.04.3UNKNOWN
Rows per page:
1-10 of 991

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.8%