Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.2.1.2020.08
Category:General
Title:Mozilla Firefox Security Advisory (MFSA2020-08) - Linux
Summary:This host is missing a security update for Mozilla Firefox.
Description:Summary:
This host is missing a security update for Mozilla Firefox.

Vulnerability Insight:
CVE-2020-6805: Use-after-free when removing data about origins
When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash.

CVE-2020-6806: BodyStream::OnInputStreamReady was missing protections against state confusion
By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash.

CVE-2020-6807: Use-after-free in cubeb during stream destruction
When a device was changed while a stream was about to be destroyed, the stream-reinit task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash.

CVE-2020-6808: URL Spoofing via javascript: URL
When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was the originating javascript: URL which could lead to spoofing attacks, it is now correctly the URL of the originating document.

CVE-2020-6809: Web Extensions with the all-urls permission could access local files
When a Web Extension had the all-urls permission and made a fetch request with a mode set to 'same-origin', it was possible for the Web Extension to read local files.

CVE-2020-6810: Focusing a popup while in fullscreen could have obscured the fullscreen notification
After a website had entered fullscreen mode, it could have used a previously opened popup to obscure the notification that indicates the browser is in fullscreen mode. Combined with spoofing the browser chrome, this could have led to confusing the user about the current origin of the page and credential theft or other attacks.

CVE-2020-6811: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution.

CVE-2019-20503: Out of bounds reads in sctp_load_addresses_from_init
The inputs to sctp_load_addresses_from_init are verified by sctp_arethere_unrecognized_parameters, however, the two functions handled parameter bounds differently, resulting in out of bounds reads when parameters are partially outside a chunk.

CVE-2020-6812: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission
The first time AirPods are connected to an iPhone, they become named after the user's name by default ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
Firefox version(s) below 74.

Solution:
The vendor has released an update. Please see the reference(s) for more information.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-20503
Debian Security Information: DSA-4639 (Google Search)
https://www.debian.org/security/2020/dsa-4639
Debian Security Information: DSA-4642 (Google Search)
https://www.debian.org/security/2020/dsa-4642
Debian Security Information: DSA-4645 (Google Search)
https://www.debian.org/security/2020/dsa-4645
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DDNOAGIX5D77TTHT6YPMVJ5WTXTCQEI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWANFIR3PYAL5RJQ4AO3ZS2DYMSF2ZGZ/
http://seclists.org/fulldisclosure/2020/May/49
http://seclists.org/fulldisclosure/2020/May/59
http://seclists.org/fulldisclosure/2020/May/55
http://seclists.org/fulldisclosure/2020/May/52
https://security.gentoo.org/glsa/202003-02
https://security.gentoo.org/glsa/202003-10
https://bugs.chromium.org/p/project-zero/issues/detail?id=1992
https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html
https://crbug.com/1059349
https://github.com/sctplab/usrsctp/commit/790a7a2555aefb392a5a69923f1e9d17b4968467
https://support.apple.com/HT211168
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211177
https://lists.debian.org/debian-lts-announce/2020/03/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00003.html
RedHat Security Advisories: RHSA-2020:0815
https://access.redhat.com/errata/RHSA-2020:0815
RedHat Security Advisories: RHSA-2020:0816
https://access.redhat.com/errata/RHSA-2020:0816
RedHat Security Advisories: RHSA-2020:0819
https://access.redhat.com/errata/RHSA-2020:0819
RedHat Security Advisories: RHSA-2020:0820
https://access.redhat.com/errata/RHSA-2020:0820
SuSE Security Announcement: openSUSE-SU-2020:0340 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html
SuSE Security Announcement: openSUSE-SU-2020:0365 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html
SuSE Security Announcement: openSUSE-SU-2020:0366 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html
SuSE Security Announcement: openSUSE-SU-2020:0389 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html
https://usn.ubuntu.com/4299-1/
https://usn.ubuntu.com/4328-1/
https://usn.ubuntu.com/4335-1/
Common Vulnerability Exposure (CVE) ID: CVE-2020-6805
https://bugzilla.mozilla.org/show_bug.cgi?id=1610880
https://www.mozilla.org/security/advisories/mfsa2020-08/
https://www.mozilla.org/security/advisories/mfsa2020-09/
https://www.mozilla.org/security/advisories/mfsa2020-10/
Common Vulnerability Exposure (CVE) ID: CVE-2020-6806
http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1612308
Common Vulnerability Exposure (CVE) ID: CVE-2020-6807
https://bugzilla.mozilla.org/show_bug.cgi?id=1614971
Common Vulnerability Exposure (CVE) ID: CVE-2020-6808
https://bugzilla.mozilla.org/show_bug.cgi?id=1247968
Common Vulnerability Exposure (CVE) ID: CVE-2020-6809
https://bugzilla.mozilla.org/show_bug.cgi?id=1420296
Common Vulnerability Exposure (CVE) ID: CVE-2020-6810
https://bugzilla.mozilla.org/show_bug.cgi?id=1432856
Common Vulnerability Exposure (CVE) ID: CVE-2020-6811
https://bugzilla.mozilla.org/show_bug.cgi?id=1607742
Common Vulnerability Exposure (CVE) ID: CVE-2020-6812
https://bugzilla.mozilla.org/show_bug.cgi?id=1616661
Common Vulnerability Exposure (CVE) ID: CVE-2020-6813
https://bugzilla.mozilla.org/show_bug.cgi?id=1605814
Common Vulnerability Exposure (CVE) ID: CVE-2020-6814
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339
Common Vulnerability Exposure (CVE) ID: CVE-2020-6815
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1181957%2C1557732%2C1557739%2C1611457%2C1612431
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.