Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2020-AVI-012
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Firefox versions ant\u00e9rieures \u00e0 72", "product": { "name": "Firefox", "vendor": { "name": "Mozilla", "scada": false } } }, { "description": "Firefox ESR versions ant\u00e9rieures \u00e0 ESR 68.4", "product": { "name": "Firefox", "vendor": { "name": "Mozilla", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-17020", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17020" }, { "name": "CVE-2019-17016", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17016" }, { "name": "CVE-2019-17017", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17017" }, { "name": "CVE-2019-17023", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17023" }, { "name": "CVE-2019-17022", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17022" }, { "name": "CVE-2019-17019", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17019" }, { "name": "CVE-2019-17018", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17018" }, { "name": "CVE-2019-17025", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17025" }, { "name": "CVE-2019-17015", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17015" }, { "name": "CVE-2019-17021", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17021" }, { "name": "CVE-2019-17024", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17024" } ], "initial_release_date": "2020-01-08T00:00:00", "last_revision_date": "2020-01-08T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-012", "revisions": [ { "description": "Version initiale", "revision_date": "2020-01-08T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2020-02 du 07 janvier 2020", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-02/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2020-01 du 07 janvier 2020", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/" } ] }
CVE-2019-17019 (GCVE-0-2019-17019)
Vulnerability from cvelistv5
Published
2020-01-08 21:28
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Python files could be inadvertently executed upon opening a download
Summary
When Python was installed on Windows, a python file being served with the MIME type of text/plain could be executed by Python instead of being opened as a text file when the Open option was selected upon download. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 72.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1568003" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 72" } ] } ], "descriptions": [ { "lang": "en", "value": "When Python was installed on Windows, a python file being served with the MIME type of text/plain could be executed by Python instead of being opened as a text file when the Open option was selected upon download. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 72." } ], "problemTypes": [ { "descriptions": [ { "description": "Python files could be inadvertently executed upon opening a download", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-08T21:28:47", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1568003" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2019-17019", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firefox", "version": { "version_data": [ { "version_value": "before 72" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When Python was installed on Windows, a python file being served with the MIME type of text/plain could be executed by Python instead of being opened as a text file when the Open option was selected upon download. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 72." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Python files could be inadvertently executed upon opening a download" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1568003", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1568003" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-01/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2019-17019", "datePublished": "2020-01-08T21:28:47", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-17023 (GCVE-0-2019-17023)
Vulnerability from cvelistv5
Published
2020-01-08 21:30
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- NSS may negotiate TLS 1.2 or below after a TLS 1.3 HelloRetryRequest had been sent
Summary
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.
References
URL | Tags | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.748Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1590001" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "USN-4397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4397-1/" }, { "name": "DSA-4726", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4726" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 72" } ] } ], "descriptions": [ { "lang": "en", "value": "After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox \u003c 72." } ], "problemTypes": [ { "descriptions": [ { "description": "NSS may negotiate TLS 1.2 or below after a TLS 1.3 HelloRetryRequest had been sent", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-18T15:06:08", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1590001" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "USN-4397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4397-1/" }, { "name": "DSA-4726", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4726" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2019-17023", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firefox", "version": { "version_data": [ { "version_value": "before 72" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox \u003c 72." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NSS may negotiate TLS 1.2 or below after a TLS 1.3 HelloRetryRequest had been sent" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1590001", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1590001" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-01/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "USN-4234-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "USN-4397-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4397-1/" }, { "name": "DSA-4726", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4726" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2019-17023", "datePublished": "2020-01-08T21:30:29", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.748Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-17015 (GCVE-0-2019-17015)
Vulnerability from cvelistv5
Published
2020-01-08 21:26
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory corruption in parent process during new content process initialization on Windows
Summary
During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
References
URL | Tags | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Mozilla | Firefox ESR |
Version: before 68.4 |
||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.689Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1599005" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "openSUSE-SU-2020:0060", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "openSUSE-SU-2020:0094", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 68.4" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 72" } ] } ], "descriptions": [ { "lang": "en", "value": "During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 68.4 and Firefox \u003c 72." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption in parent process during new content process initialization on Windows", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-22T18:06:19", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1599005" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "openSUSE-SU-2020:0060", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "openSUSE-SU-2020:0094", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2019-17015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_value": "before 68.4" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_value": "before 72" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 68.4 and Firefox \u003c 72." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory corruption in parent process during new content process initialization on Windows" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1599005", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1599005" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-01/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-02/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "openSUSE-SU-2020:0060", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "openSUSE-SU-2020:0094", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2019-17015", "datePublished": "2020-01-08T21:26:15", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.689Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-17017 (GCVE-0-2019-17017)
Vulnerability from cvelistv5
Published
2020-01-08 21:27
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Type Confusion in XPCVariant.cpp
Summary
Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Mozilla | Firefox ESR |
Version: before 68.4 |
||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.752Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1603055" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200109 [SECURITY] [DSA 4600-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/12" }, { "name": "[debian-lts-announce] 20200109 [SECURITY] [DLA 2061-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html" }, { "name": "DSA-4600", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4600" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "RHSA-2020:0085", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0085" }, { "name": "RHSA-2020:0086", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0086" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "RHSA-2020:0111", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0111" }, { "name": "openSUSE-SU-2020:0060", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "RHSA-2020:0120", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0120" }, { "name": "RHSA-2020:0123", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0123" }, { "name": "RHSA-2020:0127", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0127" }, { "name": "USN-4241-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4241-1/" }, { "name": "DSA-4603", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4603" }, { "name": "20200120 [SECURITY] [DSA 4603-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/26" }, { "name": "[debian-lts-announce] 20200120 [SECURITY] [DLA 2071-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html" }, { "name": "openSUSE-SU-2020:0094", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" }, { "name": "RHSA-2020:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0292" }, { "name": "RHSA-2020:0295", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0295" }, { "name": "GLSA-202003-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-02" }, { "name": "USN-4335-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4335-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 68.4" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 72" } ] } ], "descriptions": [ { "lang": "en", "value": "Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 68.4 and Firefox \u003c 72." } ], "problemTypes": [ { "descriptions": [ { "description": "Type Confusion in XPCVariant.cpp", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-29T02:06:58", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1603055" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200109 [SECURITY] [DSA 4600-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/12" }, { "name": "[debian-lts-announce] 20200109 [SECURITY] [DLA 2061-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html" }, { "name": "DSA-4600", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4600" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "RHSA-2020:0085", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0085" }, { "name": "RHSA-2020:0086", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0086" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "RHSA-2020:0111", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0111" }, { "name": "openSUSE-SU-2020:0060", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "RHSA-2020:0120", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0120" }, { "name": "RHSA-2020:0123", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0123" }, { "name": "RHSA-2020:0127", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0127" }, { "name": "USN-4241-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4241-1/" }, { "name": "DSA-4603", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4603" }, { "name": "20200120 [SECURITY] [DSA 4603-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/26" }, { "name": "[debian-lts-announce] 20200120 [SECURITY] [DLA 2071-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html" }, { "name": "openSUSE-SU-2020:0094", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" }, { "name": "RHSA-2020:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0292" }, { "name": "RHSA-2020:0295", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0295" }, { "name": "GLSA-202003-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-02" }, { "name": "USN-4335-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4335-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2019-17017", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_value": "before 68.4" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_value": "before 72" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 68.4 and Firefox \u003c 72." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Type Confusion in XPCVariant.cpp" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1603055", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1603055" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-01/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-02/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200109 [SECURITY] [DSA 4600-1] firefox-esr security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/12" }, { "name": "[debian-lts-announce] 20200109 [SECURITY] [DLA 2061-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html" }, { "name": "DSA-4600", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4600" }, { "name": "USN-4234-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "RHSA-2020:0085", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0085" }, { "name": "RHSA-2020:0086", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0086" }, { "name": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "RHSA-2020:0111", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0111" }, { "name": "openSUSE-SU-2020:0060", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "RHSA-2020:0120", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0120" }, { "name": "RHSA-2020:0123", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0123" }, { "name": "RHSA-2020:0127", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0127" }, { "name": "USN-4241-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4241-1/" }, { "name": "DSA-4603", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4603" }, { "name": "20200120 [SECURITY] [DSA 4603-1] thunderbird security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/26" }, { "name": "[debian-lts-announce] 20200120 [SECURITY] [DLA 2071-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html" }, { "name": "openSUSE-SU-2020:0094", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" }, { "name": "RHSA-2020:0292", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0292" }, { "name": "RHSA-2020:0295", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0295" }, { "name": "GLSA-202003-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-02" }, { "name": "USN-4335-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4335-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2019-17017", "datePublished": "2020-01-08T21:27:36", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.752Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-17018 (GCVE-0-2019-17018)
Vulnerability from cvelistv5
Published
2020-01-08 21:28
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Windows Keyboard in Private Browsing Mode may retain word suggestions
Summary
When in Private Browsing Mode on Windows 10, the Windows keyboard may retain word suggestions to improve the accuracy of the keyboard. This vulnerability affects Firefox < 72.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.756Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1549394" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 72" } ] } ], "descriptions": [ { "lang": "en", "value": "When in Private Browsing Mode on Windows 10, the Windows keyboard may retain word suggestions to improve the accuracy of the keyboard. This vulnerability affects Firefox \u003c 72." } ], "problemTypes": [ { "descriptions": [ { "description": "Windows Keyboard in Private Browsing Mode may retain word suggestions", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-08T21:28:09", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1549394" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2019-17018", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firefox", "version": { "version_data": [ { "version_value": "before 72" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When in Private Browsing Mode on Windows 10, the Windows keyboard may retain word suggestions to improve the accuracy of the keyboard. This vulnerability affects Firefox \u003c 72." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Windows Keyboard in Private Browsing Mode may retain word suggestions" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1549394", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1549394" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-01/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2019-17018", "datePublished": "2020-01-08T21:28:09", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-17016 (GCVE-0-2019-17016)
Vulnerability from cvelistv5
Published
2020-01-08 21:27
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Bypass of @namespace CSS sanitization during pasting
Summary
When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Mozilla | Firefox ESR |
Version: before 68.4 |
||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1599181" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200109 [SECURITY] [DSA 4600-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/12" }, { "name": "[debian-lts-announce] 20200109 [SECURITY] [DLA 2061-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html" }, { "name": "DSA-4600", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4600" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "RHSA-2020:0085", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0085" }, { "name": "RHSA-2020:0086", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0086" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "RHSA-2020:0111", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0111" }, { "name": "openSUSE-SU-2020:0060", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "RHSA-2020:0120", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0120" }, { "name": "RHSA-2020:0123", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0123" }, { "name": "RHSA-2020:0127", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0127" }, { "name": "USN-4241-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4241-1/" }, { "name": "DSA-4603", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4603" }, { "name": "20200120 [SECURITY] [DSA 4603-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/26" }, { "name": "[debian-lts-announce] 20200120 [SECURITY] [DLA 2071-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html" }, { "name": "openSUSE-SU-2020:0094", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" }, { "name": "RHSA-2020:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0292" }, { "name": "RHSA-2020:0295", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0295" }, { "name": "GLSA-202003-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-02" }, { "name": "USN-4335-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4335-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 68.4" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 72" } ] } ], "descriptions": [ { "lang": "en", "value": "When pasting a \u0026lt;style\u0026gt; tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability affects Firefox ESR \u003c 68.4 and Firefox \u003c 72." } ], "problemTypes": [ { "descriptions": [ { "description": "Bypass of @namespace CSS sanitization during pasting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-29T02:06:52", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1599181" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200109 [SECURITY] [DSA 4600-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/12" }, { "name": "[debian-lts-announce] 20200109 [SECURITY] [DLA 2061-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html" }, { "name": "DSA-4600", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4600" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "RHSA-2020:0085", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0085" }, { "name": "RHSA-2020:0086", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0086" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "RHSA-2020:0111", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0111" }, { "name": "openSUSE-SU-2020:0060", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "RHSA-2020:0120", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0120" }, { "name": "RHSA-2020:0123", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0123" }, { "name": "RHSA-2020:0127", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0127" }, { "name": "USN-4241-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4241-1/" }, { "name": "DSA-4603", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4603" }, { "name": "20200120 [SECURITY] [DSA 4603-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/26" }, { "name": "[debian-lts-announce] 20200120 [SECURITY] [DLA 2071-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html" }, { "name": "openSUSE-SU-2020:0094", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" }, { "name": "RHSA-2020:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0292" }, { "name": "RHSA-2020:0295", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0295" }, { "name": "GLSA-202003-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-02" }, { "name": "USN-4335-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4335-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2019-17016", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_value": "before 68.4" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_value": "before 72" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When pasting a \u0026lt;style\u0026gt; tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability affects Firefox ESR \u003c 68.4 and Firefox \u003c 72." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Bypass of @namespace CSS sanitization during pasting" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1599181", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1599181" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-01/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-02/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200109 [SECURITY] [DSA 4600-1] firefox-esr security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/12" }, { "name": "[debian-lts-announce] 20200109 [SECURITY] [DLA 2061-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html" }, { "name": "DSA-4600", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4600" }, { "name": "USN-4234-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "RHSA-2020:0085", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0085" }, { "name": "RHSA-2020:0086", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0086" }, { "name": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "RHSA-2020:0111", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0111" }, { "name": "openSUSE-SU-2020:0060", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "RHSA-2020:0120", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0120" }, { "name": "RHSA-2020:0123", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0123" }, { "name": "RHSA-2020:0127", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0127" }, { "name": "USN-4241-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4241-1/" }, { "name": "DSA-4603", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4603" }, { "name": "20200120 [SECURITY] [DSA 4603-1] thunderbird security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/26" }, { "name": "[debian-lts-announce] 20200120 [SECURITY] [DLA 2071-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html" }, { "name": "openSUSE-SU-2020:0094", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" }, { "name": "RHSA-2020:0292", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0292" }, { "name": "RHSA-2020:0295", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0295" }, { "name": "GLSA-202003-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-02" }, { "name": "USN-4335-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4335-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2019-17016", "datePublished": "2020-01-08T21:27:03", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-17021 (GCVE-0-2019-17021)
Vulnerability from cvelistv5
Published
2020-01-08 21:29
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Heap address disclosure in parent process during content process initialization on Windows
Summary
During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
References
URL | Tags | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Mozilla | Firefox ESR |
Version: before 68.4 |
||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1599008" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "openSUSE-SU-2020:0060", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "openSUSE-SU-2020:0094", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 68.4" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 72" } ] } ], "descriptions": [ { "lang": "en", "value": "During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 68.4 and Firefox \u003c 72." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap address disclosure in parent process during content process initialization on Windows", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-22T18:06:16", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1599008" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "openSUSE-SU-2020:0060", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "openSUSE-SU-2020:0094", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2019-17021", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_value": "before 68.4" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_value": "before 72" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 68.4 and Firefox \u003c 72." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap address disclosure in parent process during content process initialization on Windows" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1599008", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1599008" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-01/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-02/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "openSUSE-SU-2020:0060", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "openSUSE-SU-2020:0094", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2019-17021", "datePublished": "2020-01-08T21:29:40", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-17022 (GCVE-0-2019-17022)
Vulnerability from cvelistv5
Published
2020-01-08 21:30
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CSS sanitization does not escape HTML tags
Summary
When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer does not escape < and > characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Mozilla | Firefox ESR |
Version: before 68.4 |
||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.712Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1602843" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200109 [SECURITY] [DSA 4600-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/12" }, { "name": "[debian-lts-announce] 20200109 [SECURITY] [DLA 2061-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html" }, { "name": "DSA-4600", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4600" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "RHSA-2020:0085", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0085" }, { "name": "RHSA-2020:0086", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0086" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "RHSA-2020:0111", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0111" }, { "name": "openSUSE-SU-2020:0060", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "RHSA-2020:0120", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0120" }, { "name": "RHSA-2020:0123", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0123" }, { "name": "RHSA-2020:0127", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0127" }, { "name": "USN-4241-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4241-1/" }, { "name": "DSA-4603", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4603" }, { "name": "20200120 [SECURITY] [DSA 4603-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/26" }, { "name": "[debian-lts-announce] 20200120 [SECURITY] [DLA 2071-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html" }, { "name": "openSUSE-SU-2020:0094", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" }, { "name": "RHSA-2020:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0292" }, { "name": "RHSA-2020:0295", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0295" }, { "name": "GLSA-202003-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-02" }, { "name": "USN-4335-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4335-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 68.4" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 72" } ] } ], "descriptions": [ { "lang": "en", "value": "When pasting a \u0026lt;style\u0026gt; tag from the clipboard into a rich text editor, the CSS sanitizer does not escape \u0026lt; and \u0026gt; characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node\u0027s innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Firefox ESR \u003c 68.4 and Firefox \u003c 72." } ], "problemTypes": [ { "descriptions": [ { "description": "CSS sanitization does not escape HTML tags", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-29T02:07:03", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1602843" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200109 [SECURITY] [DSA 4600-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/12" }, { "name": "[debian-lts-announce] 20200109 [SECURITY] [DLA 2061-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html" }, { "name": "DSA-4600", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4600" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "RHSA-2020:0085", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0085" }, { "name": "RHSA-2020:0086", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0086" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "RHSA-2020:0111", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0111" }, { "name": "openSUSE-SU-2020:0060", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "RHSA-2020:0120", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0120" }, { "name": "RHSA-2020:0123", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0123" }, { "name": "RHSA-2020:0127", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0127" }, { "name": "USN-4241-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4241-1/" }, { "name": "DSA-4603", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4603" }, { "name": "20200120 [SECURITY] [DSA 4603-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/26" }, { "name": "[debian-lts-announce] 20200120 [SECURITY] [DLA 2071-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html" }, { "name": "openSUSE-SU-2020:0094", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" }, { "name": "RHSA-2020:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0292" }, { "name": "RHSA-2020:0295", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0295" }, { "name": "GLSA-202003-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-02" }, { "name": "USN-4335-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4335-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2019-17022", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_value": "before 68.4" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_value": "before 72" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When pasting a \u0026lt;style\u0026gt; tag from the clipboard into a rich text editor, the CSS sanitizer does not escape \u0026lt; and \u0026gt; characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node\u0027s innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Firefox ESR \u003c 68.4 and Firefox \u003c 72." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CSS sanitization does not escape HTML tags" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1602843", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1602843" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-01/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-02/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200109 [SECURITY] [DSA 4600-1] firefox-esr security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/12" }, { "name": "[debian-lts-announce] 20200109 [SECURITY] [DLA 2061-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html" }, { "name": "DSA-4600", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4600" }, { "name": "USN-4234-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "RHSA-2020:0085", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0085" }, { "name": "RHSA-2020:0086", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0086" }, { "name": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "RHSA-2020:0111", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0111" }, { "name": "openSUSE-SU-2020:0060", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "RHSA-2020:0120", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0120" }, { "name": "RHSA-2020:0123", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0123" }, { "name": "RHSA-2020:0127", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0127" }, { "name": "USN-4241-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4241-1/" }, { "name": "DSA-4603", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4603" }, { "name": "20200120 [SECURITY] [DSA 4603-1] thunderbird security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/26" }, { "name": "[debian-lts-announce] 20200120 [SECURITY] [DLA 2071-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html" }, { "name": "openSUSE-SU-2020:0094", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" }, { "name": "RHSA-2020:0292", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0292" }, { "name": "RHSA-2020:0295", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0295" }, { "name": "GLSA-202003-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-02" }, { "name": "USN-4335-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4335-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2019-17022", "datePublished": "2020-01-08T21:30:09", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.712Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-17024 (GCVE-0-2019-17024)
Vulnerability from cvelistv5
Published
2020-01-08 21:31
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
Summary
Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Mozilla | Firefox ESR |
Version: before 68.4 |
||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.822Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507180%2C1595470%2C1598605%2C1601826" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200109 [SECURITY] [DSA 4600-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/12" }, { "name": "[debian-lts-announce] 20200109 [SECURITY] [DLA 2061-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html" }, { "name": "DSA-4600", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4600" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "RHSA-2020:0085", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0085" }, { "name": "RHSA-2020:0086", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0086" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "RHSA-2020:0111", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0111" }, { "name": "openSUSE-SU-2020:0060", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "RHSA-2020:0120", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0120" }, { "name": "RHSA-2020:0123", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0123" }, { "name": "RHSA-2020:0127", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0127" }, { "name": "USN-4241-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4241-1/" }, { "name": "DSA-4603", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4603" }, { "name": "20200120 [SECURITY] [DSA 4603-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/26" }, { "name": "[debian-lts-announce] 20200120 [SECURITY] [DLA 2071-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html" }, { "name": "openSUSE-SU-2020:0094", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" }, { "name": "RHSA-2020:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0292" }, { "name": "RHSA-2020:0295", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0295" }, { "name": "GLSA-202003-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-02" }, { "name": "USN-4335-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4335-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 68.4" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 72" } ] } ], "descriptions": [ { "lang": "en", "value": "Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 68.4 and Firefox \u003c 72." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-29T02:07:08", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507180%2C1595470%2C1598605%2C1601826" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200109 [SECURITY] [DSA 4600-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/12" }, { "name": "[debian-lts-announce] 20200109 [SECURITY] [DLA 2061-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html" }, { "name": "DSA-4600", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4600" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "RHSA-2020:0085", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0085" }, { "name": "RHSA-2020:0086", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0086" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "RHSA-2020:0111", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0111" }, { "name": "openSUSE-SU-2020:0060", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "RHSA-2020:0120", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0120" }, { "name": "RHSA-2020:0123", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0123" }, { "name": "RHSA-2020:0127", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0127" }, { "name": "USN-4241-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4241-1/" }, { "name": "DSA-4603", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4603" }, { "name": "20200120 [SECURITY] [DSA 4603-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/26" }, { "name": "[debian-lts-announce] 20200120 [SECURITY] [DLA 2071-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html" }, { "name": "openSUSE-SU-2020:0094", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" }, { "name": "RHSA-2020:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0292" }, { "name": "RHSA-2020:0295", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0295" }, { "name": "GLSA-202003-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-02" }, { "name": "USN-4335-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4335-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2019-17024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_value": "before 68.4" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_value": "before 72" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 68.4 and Firefox \u003c 72." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507180%2C1595470%2C1598605%2C1601826", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507180%2C1595470%2C1598605%2C1601826" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-01/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-02/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-02/" }, { "name": "20200109 [SECURITY] [DSA 4600-1] firefox-esr security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/12" }, { "name": "[debian-lts-announce] 20200109 [SECURITY] [DLA 2061-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html" }, { "name": "DSA-4600", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4600" }, { "name": "USN-4234-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4234-1/" }, { "name": "20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/18" }, { "name": "RHSA-2020:0085", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0085" }, { "name": "RHSA-2020:0086", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0086" }, { "name": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html" }, { "name": "RHSA-2020:0111", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0111" }, { "name": "openSUSE-SU-2020:0060", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" }, { "name": "RHSA-2020:0120", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0120" }, { "name": "RHSA-2020:0123", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0123" }, { "name": "RHSA-2020:0127", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0127" }, { "name": "USN-4241-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4241-1/" }, { "name": "DSA-4603", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4603" }, { "name": "20200120 [SECURITY] [DSA 4603-1] thunderbird security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/26" }, { "name": "[debian-lts-announce] 20200120 [SECURITY] [DLA 2071-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html" }, { "name": "openSUSE-SU-2020:0094", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" }, { "name": "RHSA-2020:0292", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0292" }, { "name": "RHSA-2020:0295", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0295" }, { "name": "GLSA-202003-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-02" }, { "name": "USN-4335-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4335-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2019-17024", "datePublished": "2020-01-08T21:31:03", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.822Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-17020 (GCVE-0-2019-17020)
Vulnerability from cvelistv5
Published
2020-01-08 21:29
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Content Security Policy not applied to XSL stylesheets applied to XML documents
Summary
If an XML file is served with a Content Security Policy and the XML file includes an XSL stylesheet, the Content Security Policy will not be applied to the contents of the XSL stylesheet. If the XSL sheet e.g. includes JavaScript, it would bypass any of the restrictions of the Content Security Policy applied to the XML document. This vulnerability affects Firefox < 72.
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.668Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1597645" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4234-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 72" } ] } ], "descriptions": [ { "lang": "en", "value": "If an XML file is served with a Content Security Policy and the XML file includes an XSL stylesheet, the Content Security Policy will not be applied to the contents of the XSL stylesheet. If the XSL sheet e.g. includes JavaScript, it would bypass any of the restrictions of the Content Security Policy applied to the XML document. This vulnerability affects Firefox \u003c 72." } ], "problemTypes": [ { "descriptions": [ { "description": "Content Security Policy not applied to XSL stylesheets applied to XML documents", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-09T23:06:00", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1597645" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4234-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2019-17020", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firefox", "version": { "version_data": [ { "version_value": "before 72" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "If an XML file is served with a Content Security Policy and the XML file includes an XSL stylesheet, the Content Security Policy will not be applied to the contents of the XSL stylesheet. If the XSL sheet e.g. includes JavaScript, it would bypass any of the restrictions of the Content Security Policy applied to the XML document. This vulnerability affects Firefox \u003c 72." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Content Security Policy not applied to XSL stylesheets applied to XML documents" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1597645", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1597645" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-01/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "USN-4234-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4234-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2019-17020", "datePublished": "2020-01-08T21:29:16", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.668Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-17025 (GCVE-0-2019-17025)
Vulnerability from cvelistv5
Published
2020-01-08 21:31
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory safety bugs fixed in Firefox 72
Summary
Mozilla developers reported memory safety bugs present in Firefox 71. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 72.
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1328295%2C1328300%2C1590447%2C1590965%2C1595692%2C1597321%2C1597481" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4234-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "before 72" } ] } ], "descriptions": [ { "lang": "en", "value": "Mozilla developers reported memory safety bugs present in Firefox 71. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 72." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory safety bugs fixed in Firefox 72", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-09T23:06:02", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1328295%2C1328300%2C1590447%2C1590965%2C1595692%2C1597321%2C1597481" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "USN-4234-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4234-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2019-17025", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firefox", "version": { "version_data": [ { "version_value": "before 72" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mozilla developers reported memory safety bugs present in Firefox 71. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 72." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory safety bugs fixed in Firefox 72" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1328295%2C1328300%2C1590447%2C1590965%2C1595692%2C1597321%2C1597481", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1328295%2C1328300%2C1590447%2C1590965%2C1595692%2C1597321%2C1597481" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2020-01/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2020-01/" }, { "name": "USN-4234-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4234-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2019-17025", "datePublished": "2020-01-08T21:31:26", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…