Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2023.5782.2
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-5782-2)
Summary:The remote host is missing an update for the 'firefox' package(s) announced via the USN-5782-2 advisory.
Description:Summary:
The remote host is missing an update for the 'firefox' package(s) announced via the USN-5782-2 advisory.

Vulnerability Insight:
USN-5782-1 fixed vulnerabilities in Firefox. The update introduced
several minor regressions. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that Firefox was using an out-of-date libusrsctp library.
An attacker could possibly use this library to perform a reentrancy issue
on Firefox. (CVE-2022-46871)

Nika Layzell discovered that Firefox was not performing a check on paste
received from cross-processes. An attacker could potentially exploit this
to obtain sensitive information. (CVE-2022-46872)

Pete Freitag discovered that Firefox did not implement the unsafe-hashes
CSP directive. An attacker who was able to inject markup into a page
otherwise protected by a Content Security Policy may have been able to
inject an executable script. (CVE-2022-46873)

Matthias Zoellner discovered that Firefox was not keeping the filename
ending intact when using the drag-and-drop event. An attacker could
possibly use this issue to add a file with a malicious extension, leading
to execute arbitrary code. (CVE-2022-46874)

Hafiizh discovered that Firefox was not handling fullscreen notifications
when the browser window goes into fullscreen mode. An attacker could
possibly use this issue to spoof the user and obtain sensitive information.
(CVE-2022-46877)

Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. (CVE-2022-46878,
CVE-2022-46879)

Affected Software/OS:
'firefox' package(s) on Ubuntu 18.04, Ubuntu 20.04.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-46871
Debian Security Information: DSA-5322 (Google Search)
https://www.debian.org/security/2023/dsa-5322
Debian Security Information: DSA-5355 (Google Search)
https://www.debian.org/security/2023/dsa-5355
https://security.gentoo.org/glsa/202305-06
https://security.gentoo.org/glsa/202305-13
https://bugzilla.mozilla.org/show_bug.cgi?id=1795697
https://www.mozilla.org/security/advisories/mfsa2022-51/
https://lists.debian.org/debian-lts-announce/2023/01/msg00015.html
https://lists.debian.org/debian-lts-announce/2023/02/msg00018.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-46872
https://bugzilla.mozilla.org/show_bug.cgi?id=1799156
https://www.mozilla.org/security/advisories/mfsa2022-52/
https://www.mozilla.org/security/advisories/mfsa2022-53/
Common Vulnerability Exposure (CVE) ID: CVE-2022-46873
https://bugzilla.mozilla.org/show_bug.cgi?id=1644790
Common Vulnerability Exposure (CVE) ID: CVE-2022-46874
https://bugzilla.mozilla.org/show_bug.cgi?id=1746139
https://www.mozilla.org/security/advisories/mfsa2022-54/
Common Vulnerability Exposure (CVE) ID: CVE-2022-46877
https://bugzilla.mozilla.org/show_bug.cgi?id=1795139
Common Vulnerability Exposure (CVE) ID: CVE-2022-46878
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1782219%2C1797370%2C1797685%2C1801102%2C1801315%2C1802395
Common Vulnerability Exposure (CVE) ID: CVE-2022-46879
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1736224%2C1793407%2C1794249%2C1795845%2C1797682%2C1797720%2C1798494%2C1799479
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.