Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-9794
HistoryApr 26, 2019 - 12:00 a.m.

CVE-2019-9794

2019-04-2600:00:00
ubuntu.com
ubuntu.com
11

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

73.9%

A vulnerability was discovered where specific command line arguments are
not properly discarded during Firefox invocation as a shell handler for
URLs. This could be used to retrieve and execute files whose location is
supplied through these command line arguments if Firefox is configured as
the default URI handler for a given URI scheme in third party applications
and these applications insufficiently sanitize URL data. Note: This issue
only affects Windows operating systems. Other operating systems are
unaffected.
. This vulnerability affects Thunderbird < 60.6, Firefox ESR <
60.6, and Firefox < 66.

Notes

Author Note
tyhicks mozjs contains a copy of the SpiderMonkey JavaScript engine
seth-arnold Only affects Windows

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

73.9%