Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-9813 (GCVE-0-2019-9813)
Vulnerability from cvelistv5 – Published: 2019-04-26 16:09 – Updated: 2024-08-04 22:01- Ionmonkey type confusion with __proto__ mutations
| URL | Tags |
|---|---|
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_MISC |
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_MISC |
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_MISC |
| https://bugzilla.mozilla.org/show_bug.cgi?id=1538006 | x_refsource_MISC |
| https://access.redhat.com/errata/RHSA-2019:0966 | vendor-advisoryx_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2019:1144 | vendor-advisoryx_refsource_REDHAT |
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 66.0.1
(custom)
|
|
| Mozilla | Firefox ESR |
Affected:
unspecified , < 60.6.1
(custom)
|
|
| Mozilla | Thunderbird |
Affected:
unspecified , < 60.6.1
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T22:01:54.683Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-09/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-10/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-12/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1538006"
},
{
"name": "RHSA-2019:0966",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0966"
},
{
"name": "RHSA-2019:1144",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1144"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "66.0.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "60.6.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "60.6.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Ionmonkey type confusion with __proto__ mutations",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-05-13T09:06:07.000Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-09/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-10/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-12/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1538006"
},
{
"name": "RHSA-2019:0966",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0966"
},
{
"name": "RHSA-2019:1144",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1144"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2019-9813",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "66.0.1"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.6.1"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.6.1"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Ionmonkey type confusion with __proto__ mutations"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-09/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-09/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-10/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-10/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-12/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-12/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1538006",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1538006"
},
{
"name": "RHSA-2019:0966",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0966"
},
{
"name": "RHSA-2019:1144",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1144"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2019-9813",
"datePublished": "2019-04-26T16:09:57.000Z",
"dateReserved": "2019-03-14T00:00:00.000Z",
"dateUpdated": "2024-08-04T22:01:54.683Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-9813",
"date": "2026-05-20",
"epss": "0.46675",
"percentile": "0.97705"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"66.0.1\", \"matchCriteriaId\": \"7D4A306C-30E4-40FD-9F96-43493E896519\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"60.6.1\", \"matchCriteriaId\": \"B12D1569-B8DF-49DD-8F64-1D34EE31A9F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"60.6.1\", \"matchCriteriaId\": \"CC9BD8AD-54DD-44E6-983F-4FF1FA370CB3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1.\"}, {\"lang\": \"es\", \"value\": \"Un manejo incorrecto de __proto__ mutations puede llevar a confusi\\u00f3n de tipo en el c\\u00f3digo IonMonkey JIT, y puede aprovecharse para la lectura y escritura de memoria arbitraria. Esta vulnerabilidad afecta a Firefox versiones anteriores a 66.0.1, Firefox ESR versiones anteriores a 60.6.1 y Thunderbird versiones anteriores a 60.6.1.\"}]",
"id": "CVE-2019-9813",
"lastModified": "2024-11-21T04:52:21.743",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2019-04-26T17:29:04.163",
"references": "[{\"url\": \"https://access.redhat.com/errata/RHSA-2019:0966\", \"source\": \"security@mozilla.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1144\", \"source\": \"security@mozilla.org\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1538006\", \"source\": \"security@mozilla.org\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-09/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-10/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-12/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0966\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1144\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1538006\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-09/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-10/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-12/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-843\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-9813\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2019-04-26T17:29:04.163\",\"lastModified\":\"2025-11-25T17:50:16.803\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1.\"},{\"lang\":\"es\",\"value\":\"Un manejo incorrecto de __proto__ mutations puede llevar a confusi\u00f3n de tipo en el c\u00f3digo IonMonkey JIT, y puede aprovecharse para la lectura y escritura de memoria arbitraria. Esta vulnerabilidad afecta a Firefox versiones anteriores a 66.0.1, Firefox ESR versiones anteriores a 60.6.1 y Thunderbird versiones anteriores a 60.6.1.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-843\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"60.6.1\",\"matchCriteriaId\":\"FC968824-FD6A-4FA3-B776-366C52469982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"66.0.1\",\"matchCriteriaId\":\"7D4A306C-30E4-40FD-9F96-43493E896519\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"60.6.1\",\"matchCriteriaId\":\"CC9BD8AD-54DD-44E6-983F-4FF1FA370CB3\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0966\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1144\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1538006\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-09/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-10/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-12/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0966\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1538006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-09/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-10/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-12/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2019-AVI-125
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox versions ant\u00e9rieures \u00e0 66.0.1",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 60.6.1",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-9813",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9813"
},
{
"name": "CVE-2019-9810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9810"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-125",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-03-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2019-09 du 22 mars 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-09/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2019-10 du 22 mars 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-10/"
}
]
}
CERTFR-2019-AVI-126
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Mozilla Thunderbird versions antérieures à 60.6.1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Thunderbird versions ant\u00e9rieures \u00e0 60.6.1",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-9813",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9813"
},
{
"name": "CVE-2019-9810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9810"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-126",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-03-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2019-12 du 25 mars 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/"
}
]
}
CERTFR-2019-AVI-125
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox versions ant\u00e9rieures \u00e0 66.0.1",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 60.6.1",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-9813",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9813"
},
{
"name": "CVE-2019-9810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9810"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-125",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-03-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2019-09 du 22 mars 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-09/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2019-10 du 22 mars 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-10/"
}
]
}
CERTFR-2019-AVI-126
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Mozilla Thunderbird versions antérieures à 60.6.1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Thunderbird versions ant\u00e9rieures \u00e0 60.6.1",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-9813",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9813"
},
{
"name": "CVE-2019-9810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9810"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-126",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-03-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2019-12 du 25 mars 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/"
}
]
}
BDU:2019-01277
Vulnerability from fstec - Published: 22.03.2019{
"CVSS 2.0": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Mozilla Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "6 (Red Hat Enterprise Linux), 7 (Red Hat Enterprise Linux), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), \u0434\u043e 60.6.1 (Firefox ESR), 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f Firefox ESR \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439: \nhttps://www.mozilla.org/en-US/security/advisories/mfsa2019-10/#CVE-2019-9813\n\n\u0414\u043b\u044f Red Hat Enterprise Linux \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439: \nhttps://access.redhat.com/security/cve/cve-2019-9813\n\n\u0414\u043b\u044f Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 firefox-esr \u0434\u043e 68.12.0esr-1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se81-bulletin-20230315SE81\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 firefox \u0434\u043e 68.0.2-1astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/pages/viewpage.action?pageId=57444186",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "22.03.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "30.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "04.04.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-01277",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-9813",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Firefox ESR, Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 of __proto__ mutations JIT-\u043a\u043e\u043c\u043f\u0438\u043b\u044f\u0442\u043e\u0440\u0430 IonMonkey \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Firefox ESR, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c, \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0414\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0443 \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0441\u043e\u0432\u043c\u0435\u0441\u0442\u0438\u043c\u044b\u0435 \u0442\u0438\u043f\u044b (CWE-843)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 of __proto__ mutations JIT-\u043a\u043e\u043c\u043f\u0438\u043b\u044f\u0442\u043e\u0440\u0430 IonMonkey \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Firefox ESR \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0441\u043c\u0435\u0448\u0435\u043d\u0438\u044f \u0442\u0438\u043f\u043e\u0432 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c, \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://access.redhat.com/security/cve/cve-2019-9813\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2019-10/#CVE-2019-9813\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20230315SE81\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-843",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,3)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
CNVD-2019-08529
Vulnerability from cnvd - Published: 2019-03-29厂商已发布了漏洞修复程序,请及时关注更新: https://www.mozilla.org/en-US/security/advisories/mfsa2019-09/
| Name | Mozilla Firefox <66.0.1 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2019-9813"
}
},
"description": "Mozilla Firefox\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002\n\nMozilla Firefox 66.0.1\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4efb\u610f\u8bfb\u53d6\u548c\u5199\u5165\u5185\u5b58\u3002",
"discovererName": "Niklas Baumstark via Trend Micro\u0027s Zero Day Initiative",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2019-09/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-08529",
"openTime": "2019-03-29",
"patchDescription": "Mozilla Firefox\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002\r\n\r\nMozilla Firefox 66.0.1\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4efb\u610f\u8bfb\u53d6\u548c\u5199\u5165\u5185\u5b58\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Mozilla Firefox\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2019-08529\uff09 \u7684\u8865\u4e01",
"products": {
"product": "Mozilla Firefox \u003c66.0.1"
},
"referenceLink": "http://www.debian.org/security/2019/dsa-4417",
"serverity": "\u9ad8",
"submitTime": "2019-03-26",
"title": "Mozilla Firefox\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2019-08529\uff09"
}
FKIE_CVE-2019-9813
Vulnerability from fkie_nvd - Published: 2019-04-26 17:29 - Updated: 2025-11-25 17:50{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC968824-FD6A-4FA3-B776-366C52469982",
"versionEndExcluding": "60.6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D4A306C-30E4-40FD-9F96-43493E896519",
"versionEndExcluding": "66.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC9BD8AD-54DD-44E6-983F-4FF1FA370CB3",
"versionEndExcluding": "60.6.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1."
},
{
"lang": "es",
"value": "Un manejo incorrecto de __proto__ mutations puede llevar a confusi\u00f3n de tipo en el c\u00f3digo IonMonkey JIT, y puede aprovecharse para la lectura y escritura de memoria arbitraria. Esta vulnerabilidad afecta a Firefox versiones anteriores a 66.0.1, Firefox ESR versiones anteriores a 60.6.1 y Thunderbird versiones anteriores a 60.6.1."
}
],
"id": "CVE-2019-9813",
"lastModified": "2025-11-25T17:50:16.803",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-04-26T17:29:04.163",
"references": [
{
"source": "security@mozilla.org",
"url": "https://access.redhat.com/errata/RHSA-2019:0966"
},
{
"source": "security@mozilla.org",
"url": "https://access.redhat.com/errata/RHSA-2019:1144"
},
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1538006"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-09/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-10/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-12/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2019:0966"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2019:1144"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1538006"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-09/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-10/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-12/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-843"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-QXRM-24V6-5C8C
Vulnerability from github – Published: 2022-05-24 16:44 – Updated: 2025-11-25 18:32Incorrect handling of proto mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
{
"affected": [],
"aliases": [
"CVE-2019-9813"
],
"database_specific": {
"cwe_ids": [
"CWE-843"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-04-26T17:29:00Z",
"severity": "HIGH"
},
"details": "Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1.",
"id": "GHSA-qxrm-24v6-5c8c",
"modified": "2025-11-25T18:32:16Z",
"published": "2022-05-24T16:44:48Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9813"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:0966"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:1144"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1538006"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-09"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-10"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-12"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2019-9813
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2019-9813",
"description": "Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1.",
"id": "GSD-2019-9813",
"references": [
"https://www.suse.com/security/cve/CVE-2019-9813.html",
"https://www.debian.org/security/2019/dsa-4417",
"https://access.redhat.com/errata/RHSA-2019:1144",
"https://access.redhat.com/errata/RHSA-2019:0966",
"https://access.redhat.com/errata/RHSA-2019:0681",
"https://access.redhat.com/errata/RHSA-2019:0680",
"https://access.redhat.com/errata/RHSA-2019:0672",
"https://access.redhat.com/errata/RHSA-2019:0671",
"https://ubuntu.com/security/CVE-2019-9813",
"https://advisories.mageia.org/CVE-2019-9813.html",
"https://security.archlinux.org/CVE-2019-9813",
"https://linux.oracle.com/cve/CVE-2019-9813.html",
"https://packetstormsecurity.com/files/cve/CVE-2019-9813"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-9813"
],
"details": "Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1.",
"id": "GSD-2019-9813",
"modified": "2023-12-13T01:23:47.654771Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2019-9813",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "66.0.1"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.6.1"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.6.1"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Ionmonkey type confusion with __proto__ mutations"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-09/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-09/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-10/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-10/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-12/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-12/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1538006",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1538006"
},
{
"name": "RHSA-2019:0966",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0966"
},
{
"name": "RHSA-2019:1144",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1144"
}
]
}
},
"mozilla.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2019-9813"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "66.0.1"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.6.1"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.6.1"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Incorrect handling of \\_\\_proto\\_\\_ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox \u003c 66.0.1, Thunderbird \u003c 60.6.1, and Firefox ESR \u003c 60.6.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Ionmonkey type confusion with __proto__ mutations"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2019-10/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2019-09/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2019-12/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1538006"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "60.6.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "66.0.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "60.6.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2019-9813"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-12/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-12/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-10/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-10/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-09/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-09/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1538006",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1538006"
},
{
"name": "RHSA-2019:0966",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2019:0966"
},
{
"name": "RHSA-2019:1144",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2019:1144"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-08-24T17:37Z",
"publishedDate": "2019-04-26T17:29Z"
}
}
}
OPENSUSE-SU-2019:1077-1
Vulnerability from csaf_opensuse - Published: 2019-03-29 06:04 - Updated: 2019-03-29 06:04| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for MozillaFirefox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n \nThis update for MozillaFirefox fixes the following issues:\n\nMozilla Firefox was updated to 60.6.1esr / MFSA 2019-10 (bsc#1130262)\n\n* CVE-2019-9810: IonMonkey MArraySlice has incorrect alias information\n* CVE-2019-9813: Ionmonkey type confusion with __proto__ mutations\n\nMozilla Firefox was updated to 60.6.0esr / MFSA 2019-08 (boo#1129821)\n\n* CVE-2019-9790: Use-after-free when removing in-use DOM elements\n* CVE-2019-9791: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey\n* CVE-2019-9792: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script\n* CVE-2019-9793: Improper bounds checks when Spectre mitigations are disabled\n* CVE-2019-9794: Command line arguments not discarded during execution\n* CVE-2019-9795: Type-confusion in IonMonkey JIT compiler\n* CVE-2019-9796: Use-after-free with SMIL animation controller\n* CVE-2018-18506: Proxy Auto-Configuration file can define localhost access to be proxied\n* CVE-2019-9788: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6\n\nMozilla Firefox 60.5.2esr also had one change:\n\n* Fix a frequent crash when reading various Reuters news articles.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-1077",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1077-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:1077-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL/#F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:1077-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL/#F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL"
},
{
"category": "self",
"summary": "SUSE Bug 1129821",
"url": "https://bugzilla.suse.com/1129821"
},
{
"category": "self",
"summary": "SUSE Bug 1130262",
"url": "https://bugzilla.suse.com/1130262"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18506 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9788 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9790 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9790/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9791 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9791/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9792 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9792/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9793 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9793/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9794 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9795 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9796 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9810 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9813 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9813/"
}
],
"title": "Security update for MozillaFirefox",
"tracking": {
"current_release_date": "2019-03-29T06:04:39Z",
"generator": {
"date": "2019-03-29T06:04:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:1077-1",
"initial_release_date": "2019-03-29T06:04:39Z",
"revision_history": [
{
"date": "2019-03-29T06:04:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"product": {
"name": "MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"product_id": "MozillaFirefox-60.6.1-lp150.3.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"product": {
"name": "MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"product_id": "MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"product": {
"name": "MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"product_id": "MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"product": {
"name": "MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"product_id": "MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"product_id": "MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64",
"product_id": "MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-60.6.1-lp150.3.45.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64"
},
"product_reference": "MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64"
},
"product_reference": "MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64"
},
"product_reference": "MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64"
},
"product_reference": "MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-18506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18506"
}
],
"notes": [
{
"category": "general",
"text": "When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox \u003c 65.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18506",
"url": "https://www.suse.com/security/cve/CVE-2018-18506"
},
{
"category": "external",
"summary": "SUSE Bug 1122983 for CVE-2018-18506",
"url": "https://bugzilla.suse.com/1122983"
},
{
"category": "external",
"summary": "SUSE Bug 1129821 for CVE-2018-18506",
"url": "https://bugzilla.suse.com/1129821"
},
{
"category": "external",
"summary": "SUSE Bug 986639 for CVE-2018-18506",
"url": "https://bugzilla.suse.com/986639"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-29T06:04:39Z",
"details": "important"
}
],
"title": "CVE-2018-18506"
},
{
"cve": "CVE-2019-9788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9788"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9788",
"url": "https://www.suse.com/security/cve/CVE-2019-9788"
},
{
"category": "external",
"summary": "SUSE Bug 1129821 for CVE-2019-9788",
"url": "https://bugzilla.suse.com/1129821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-29T06:04:39Z",
"details": "important"
}
],
"title": "CVE-2019-9788"
},
{
"cve": "CVE-2019-9790",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9790"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9790",
"url": "https://www.suse.com/security/cve/CVE-2019-9790"
},
{
"category": "external",
"summary": "SUSE Bug 1129821 for CVE-2019-9790",
"url": "https://bugzilla.suse.com/1129821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-29T06:04:39Z",
"details": "important"
}
],
"title": "CVE-2019-9790"
},
{
"cve": "CVE-2019-9791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9791"
}
],
"notes": [
{
"category": "general",
"text": "The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9791",
"url": "https://www.suse.com/security/cve/CVE-2019-9791"
},
{
"category": "external",
"summary": "SUSE Bug 1129821 for CVE-2019-9791",
"url": "https://bugzilla.suse.com/1129821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-29T06:04:39Z",
"details": "important"
}
],
"title": "CVE-2019-9791"
},
{
"cve": "CVE-2019-9792",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9792"
}
],
"notes": [
{
"category": "general",
"text": "The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9792",
"url": "https://www.suse.com/security/cve/CVE-2019-9792"
},
{
"category": "external",
"summary": "SUSE Bug 1129821 for CVE-2019-9792",
"url": "https://bugzilla.suse.com/1129821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-29T06:04:39Z",
"details": "important"
}
],
"title": "CVE-2019-9792"
},
{
"cve": "CVE-2019-9793",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9793"
}
],
"notes": [
{
"category": "general",
"text": "A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9793",
"url": "https://www.suse.com/security/cve/CVE-2019-9793"
},
{
"category": "external",
"summary": "SUSE Bug 1129821 for CVE-2019-9793",
"url": "https://bugzilla.suse.com/1129821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-29T06:04:39Z",
"details": "important"
}
],
"title": "CVE-2019-9793"
},
{
"cve": "CVE-2019-9794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9794"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9794",
"url": "https://www.suse.com/security/cve/CVE-2019-9794"
},
{
"category": "external",
"summary": "SUSE Bug 1129821 for CVE-2019-9794",
"url": "https://bugzilla.suse.com/1129821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-29T06:04:39Z",
"details": "important"
}
],
"title": "CVE-2019-9794"
},
{
"cve": "CVE-2019-9795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9795"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9795",
"url": "https://www.suse.com/security/cve/CVE-2019-9795"
},
{
"category": "external",
"summary": "SUSE Bug 1129821 for CVE-2019-9795",
"url": "https://bugzilla.suse.com/1129821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-29T06:04:39Z",
"details": "important"
}
],
"title": "CVE-2019-9795"
},
{
"cve": "CVE-2019-9796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9796"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver incorrectly leaves a dangling pointer to the driver\u0027s observer array. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9796",
"url": "https://www.suse.com/security/cve/CVE-2019-9796"
},
{
"category": "external",
"summary": "SUSE Bug 1129821 for CVE-2019-9796",
"url": "https://bugzilla.suse.com/1129821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-29T06:04:39Z",
"details": "important"
}
],
"title": "CVE-2019-9796"
},
{
"cve": "CVE-2019-9810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9810"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9810",
"url": "https://www.suse.com/security/cve/CVE-2019-9810"
},
{
"category": "external",
"summary": "SUSE Bug 1129821 for CVE-2019-9810",
"url": "https://bugzilla.suse.com/1129821"
},
{
"category": "external",
"summary": "SUSE Bug 1130262 for CVE-2019-9810",
"url": "https://bugzilla.suse.com/1130262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-29T06:04:39Z",
"details": "important"
}
],
"title": "CVE-2019-9810"
},
{
"cve": "CVE-2019-9813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9813"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9813",
"url": "https://www.suse.com/security/cve/CVE-2019-9813"
},
{
"category": "external",
"summary": "SUSE Bug 1129821 for CVE-2019-9813",
"url": "https://bugzilla.suse.com/1129821"
},
{
"category": "external",
"summary": "SUSE Bug 1130262 for CVE-2019-9813",
"url": "https://bugzilla.suse.com/1130262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.6.1-lp150.3.45.1.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.6.1-lp150.3.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-29T06:04:39Z",
"details": "important"
}
],
"title": "CVE-2019-9813"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.