10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
Firefox and Firefox ESR are vulnerable to privilege escalation attacks. This is because the authentication is insufficient for channels created after the IPC process is started which allow for a sandbox escape through IPC channels due to lack of message validation in the listener process, result in gain elevated privileges.
lists.opensuse.org/opensuse-security-announce/2019-07/msg00021.html
www.securityfocus.com/bid/106781
access.redhat.com/errata/RHSA-2019:0218
access.redhat.com/errata/RHSA-2019:0219
access.redhat.com/errata/RHSA-2019:0269
access.redhat.com/errata/RHSA-2019:0270
access.redhat.com/security/updates/classification/#critical
bugzilla.mozilla.org/show_bug.cgi?id=1087565
lists.debian.org/debian-lts-announce/2019/01/msg00025.html
lists.debian.org/debian-lts-announce/2019/02/msg00024.html
security.gentoo.org/glsa/201903-04
security.gentoo.org/glsa/201904-07
usn.ubuntu.com/3874-1/
usn.ubuntu.com/3897-1/
www.debian.org/security/2019/dsa-4376
www.debian.org/security/2019/dsa-4392
www.mozilla.org/security/advisories/mfsa2019-01/
www.mozilla.org/security/advisories/mfsa2019-02/
www.mozilla.org/security/advisories/mfsa2019-03/
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P