Description: | Summary: Mozilla Firefox is prone to multiple vulnerabilities.
Vulnerability Insight: Multiple flaws exist due to,
- Symlinks may resolve to partially uninitialized buffers.
- Service Workers might have learned size of cross-origin media files.
- Fullscreen notification bypass.
- Use-after-free in InputStream implementation.
- Use-after-free of a JavaScript Realm.
- Loading fonts on workers was not thread-safe.
- Fullscreen notification bypass via windowName.
- Use-after-free in Garbage Collection.
- ServiceWorker-intercepted requests bypassed SameSite cookie policy.
- Cross-Site Tracing was possible via non-standard override headers.
- Use-after-free vulnerability in expat.
- Downloaded file may have been saved with malicious extension.
- Keystroke Side-Channel Leakage.
- Service Workers in Private Browsing Mode may have been written to disk.
- Custom mouse cursor could have been drawn over browser UI.
- Deleting a security exception did not take effect immediately.
- Iframe contents could be rendered outside the iframe.
- Memory safety bugs.
- Use-after-free in WebGL.
Vulnerability Impact: Successful exploitation will allow attackers to run arbitrary code, cause denial of service, disclose sensitive information and conduct spoofing on affected system.
Affected Software/OS: Mozilla Firefox version prior to 107 on Mac OS X.
Solution: Update to version 107 or later.
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|