{"uuid": "da781e7e-1c60-4b6b-ba28-12bd8ee6eec9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-9810", "type": "exploited", "source": "https://t.me/secinfosex/31", "content": "\u26a0\ufe0f\u041e\u0431\u043d\u043e\u0432\u043b\u044f\u0439\u0442\u0435 Firefox\n\nCVE-2019-17026: IonMonkey type confusion with StoreElementHole and FallibleStoreElement\n\nIncorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. \n\n\u2b55\ufe0f We are aware of targeted attacks in the wild abusing this flaw.\n\n\u0421\u0445\u043e\u0436\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u0433\u043e\u0434\u0443 \u0431\u044b\u043b\u0430 \u043d\u0430 \u043d\u0430 pwn2own:\nhttps://www.thezdi.com/blog/2019/4/18/the-story-of-two-winning-pwn2own-jit-vulnerabilities-in-mozilla-firefox\n\n\u0414\u0430\u0436\u0435 \u043f\u0430\u0442\u0447\u0438 \u0438\u0434\u0435\u043d\u0442\u0438\u0447\u043d\u044b:\n1. https://github.com/mozilla/gecko-dev/commit/369406707f9fef96ac8405fb9cbb58da4bcc4f1d\n2. https://github.com/mozilla/gecko-dev/commit/2e7bcc8dfa4fce5c8f3d8b224abde0627e1dee0e\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442:\nhttps://doar-e.github.io/blog/2019/06/17/a-journey-into-ionmonkey-root-causing-cve-2019-9810/\n\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2020-03/", "creation_timestamp": "2020-01-09T07:14:27.000000Z"}