Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-9818 (GCVE-0-2019-9818)
Vulnerability from cvelistv5 – Published: 2019-07-23 13:23 – Updated: 2024-08-04 22:01- Use-after-free in crash generation server
| URL | Tags |
|---|---|
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_MISC |
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_MISC |
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_MISC |
| https://bugzilla.mozilla.org/show_bug.cgi?id=1542581 | x_refsource_MISC |
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Thunderbird |
Affected:
unspecified , < 60.7
(custom)
|
|
| Mozilla | Firefox |
Affected:
unspecified , < 67
(custom)
|
|
| Mozilla | Firefox ESR |
Affected:
unspecified , < 60.7
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T22:01:54.839Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-13/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-15/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-14/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542581"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "60.7",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "67",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "60.7",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Use-after-free in crash generation server",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-07-23T13:23:53.000Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-13/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-15/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-14/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542581"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2019-9818",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.7"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "67"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.7"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use-after-free in crash generation server"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-13/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-13/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-15/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-15/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-14/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-14/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542581",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542581"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2019-9818",
"datePublished": "2019-07-23T13:23:53.000Z",
"dateReserved": "2019-03-14T00:00:00.000Z",
"dateUpdated": "2024-08-04T22:01:54.839Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-9818",
"date": "2026-05-20",
"epss": "0.00337",
"percentile": "0.56593"
},
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"67.0\", \"matchCriteriaId\": \"83DEE955-3E09-489F-BE40-2FD33EACF436\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"60.7\", \"matchCriteriaId\": \"0AE86A15-DB39-4AA7-992B-FEBC77C52CF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"60.7\", \"matchCriteriaId\": \"FD578CD5-6B23-4339-BE6F-4FC336F890B2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.\"}, {\"lang\": \"es\", \"value\": \"Se presenta una condici\\u00f3n de carrera en el servidor de generaci\\u00f3n de bloqueo utilizado para generar datos por el reportero de bloqueo. Este problema puede conllevar a un uso de la memoria previamente liberada en el proceso principal, lo que resulta en un bloqueo explotable potencialmente y un escape del sandbox. * Nota: esta vulnerabilidad solo afecta a Windows. Otros sistemas operativos no est\\u00e1n afectados. *. Esta vulnerabilidad afecta a Thunderbird anterior a versi\\u00f3n 60.7, Firefox anterior a versi\\u00f3n 67 y Firefox ESR anterior a versi\\u00f3n 60.7.\"}]",
"id": "CVE-2019-9818",
"lastModified": "2024-11-21T04:52:22.320",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 8.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 6.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:P/I:P/A:P\", \"baseScore\": 5.1, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 4.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2019-07-23T14:15:17.280",
"references": "[{\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1542581\", \"source\": \"security@mozilla.org\", \"tags\": [\"Issue Tracking\", \"Permissions Required\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-13/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-14/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-15/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1542581\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Permissions Required\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-13/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-14/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-15/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-362\"}, {\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-9818\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2019-07-23T14:15:17.280\",\"lastModified\":\"2024-11-21T04:52:22.320\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.\"},{\"lang\":\"es\",\"value\":\"Se presenta una condici\u00f3n de carrera en el servidor de generaci\u00f3n de bloqueo utilizado para generar datos por el reportero de bloqueo. Este problema puede conllevar a un uso de la memoria previamente liberada en el proceso principal, lo que resulta en un bloqueo explotable potencialmente y un escape del sandbox. * Nota: esta vulnerabilidad solo afecta a Windows. Otros sistemas operativos no est\u00e1n afectados. *. Esta vulnerabilidad afecta a Thunderbird anterior a versi\u00f3n 60.7, Firefox anterior a versi\u00f3n 67 y Firefox ESR anterior a versi\u00f3n 60.7.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":8.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"},{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"67.0\",\"matchCriteriaId\":\"83DEE955-3E09-489F-BE40-2FD33EACF436\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"60.7\",\"matchCriteriaId\":\"0AE86A15-DB39-4AA7-992B-FEBC77C52CF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"60.7\",\"matchCriteriaId\":\"FD578CD5-6B23-4339-BE6F-4FC336F890B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1542581\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-13/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-14/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-15/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1542581\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-13/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-14/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-15/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2019-AVI-236
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox versions ant\u00e9rieures \u00e0 67",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 60.7",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11692"
},
{
"name": "CVE-2019-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11693"
},
{
"name": "CVE-2019-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11694"
},
{
"name": "CVE-2019-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11691"
},
{
"name": "CVE-2019-9815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9815"
},
{
"name": "CVE-2019-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11701"
},
{
"name": "CVE-2019-9818",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9818"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11697"
},
{
"name": "CVE-2018-18511",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18511"
},
{
"name": "CVE-2019-5798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5798"
},
{
"name": "CVE-2019-9817",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9817"
},
{
"name": "CVE-2019-9819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9819"
},
{
"name": "CVE-2019-9814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9814"
},
{
"name": "CVE-2019-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11695"
},
{
"name": "CVE-2019-9816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9816"
},
{
"name": "CVE-2019-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11698"
},
{
"name": "CVE-2019-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11699"
},
{
"name": "CVE-2019-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11700"
},
{
"name": "CVE-2019-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9820"
},
{
"name": "CVE-2019-9800",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9800"
},
{
"name": "CVE-2019-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11696"
},
{
"name": "CVE-2019-9797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9797"
},
{
"name": "CVE-2019-9821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9821"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-236",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-05-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2019-13 du 21 mai 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2019-14 du 21 mai 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/"
}
]
}
CERTFR-2019-AVI-237
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Mozilla Thunderbird versions antérieures à 60.7 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Thunderbird versions ant\u00e9rieures \u00e0 60.7",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11692"
},
{
"name": "CVE-2019-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11693"
},
{
"name": "CVE-2019-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11694"
},
{
"name": "CVE-2019-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11691"
},
{
"name": "CVE-2019-9815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9815"
},
{
"name": "CVE-2019-9818",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9818"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2018-18511",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18511"
},
{
"name": "CVE-2019-5798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5798"
},
{
"name": "CVE-2019-9817",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9817"
},
{
"name": "CVE-2019-9819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9819"
},
{
"name": "CVE-2019-9816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9816"
},
{
"name": "CVE-2019-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11698"
},
{
"name": "CVE-2019-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9820"
},
{
"name": "CVE-2019-9800",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9800"
},
{
"name": "CVE-2019-9797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9797"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-237",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-05-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de\nservice et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2019-15 du 21 mai 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/"
}
]
}
CERTFR-2019-AVI-236
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox versions ant\u00e9rieures \u00e0 67",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 60.7",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11692"
},
{
"name": "CVE-2019-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11693"
},
{
"name": "CVE-2019-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11694"
},
{
"name": "CVE-2019-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11691"
},
{
"name": "CVE-2019-9815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9815"
},
{
"name": "CVE-2019-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11701"
},
{
"name": "CVE-2019-9818",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9818"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11697"
},
{
"name": "CVE-2018-18511",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18511"
},
{
"name": "CVE-2019-5798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5798"
},
{
"name": "CVE-2019-9817",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9817"
},
{
"name": "CVE-2019-9819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9819"
},
{
"name": "CVE-2019-9814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9814"
},
{
"name": "CVE-2019-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11695"
},
{
"name": "CVE-2019-9816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9816"
},
{
"name": "CVE-2019-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11698"
},
{
"name": "CVE-2019-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11699"
},
{
"name": "CVE-2019-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11700"
},
{
"name": "CVE-2019-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9820"
},
{
"name": "CVE-2019-9800",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9800"
},
{
"name": "CVE-2019-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11696"
},
{
"name": "CVE-2019-9797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9797"
},
{
"name": "CVE-2019-9821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9821"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-236",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-05-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2019-13 du 21 mai 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2019-14 du 21 mai 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/"
}
]
}
CERTFR-2019-AVI-237
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Mozilla Thunderbird versions antérieures à 60.7 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Thunderbird versions ant\u00e9rieures \u00e0 60.7",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11692"
},
{
"name": "CVE-2019-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11693"
},
{
"name": "CVE-2019-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11694"
},
{
"name": "CVE-2019-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11691"
},
{
"name": "CVE-2019-9815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9815"
},
{
"name": "CVE-2019-9818",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9818"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2018-18511",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18511"
},
{
"name": "CVE-2019-5798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5798"
},
{
"name": "CVE-2019-9817",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9817"
},
{
"name": "CVE-2019-9819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9819"
},
{
"name": "CVE-2019-9816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9816"
},
{
"name": "CVE-2019-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11698"
},
{
"name": "CVE-2019-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9820"
},
{
"name": "CVE-2019-9800",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9800"
},
{
"name": "CVE-2019-9797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9797"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-237",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-05-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de\nservice et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2019-15 du 21 mai 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/"
}
]
}
BDU:2021-03830
Vulnerability from fstec - Published: 22.07.2020{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Mozilla Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Debian GNU/Linux), 10 (Debian GNU/Linux), \u0434\u043e 67 (Firefox), \u0434\u043e 60.7 (Firefox ESR), \u0434\u043e 60.7 (Thunderbird)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Mozilla Corp.:\nhttps://www.mozilla.org/security/advisories/mfsa2019-13/\nhttps://www.mozilla.org/security/advisories/mfsa2019-14/\nhttps://www.mozilla.org/security/advisories/mfsa2019-15/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2019-9818",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "22.07.2020",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "30.07.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "30.07.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-03830",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-9818",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Firefox, Firefox ESR, Thunderbird",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Microsoft Corp Windows - , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Mozilla Firefox, Firefox ESR \u0438 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430 Thunderbird, \u0432\u044b\u0437\u0432\u0430\u043d\u043d\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0439\u0442\u0438 \u0438\u0437 \u0438\u0437\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u0441\u0440\u0435\u0434\u044b",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041e\u0434\u043d\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0435\u0439 (\u00ab\u0421\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0433\u043e\u043d\u043a\u0438\u00bb) (CWE-362)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Mozilla Firefox, Firefox ESR \u0438 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430 Thunderbird \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0439\u0442\u0438 \u0438\u0437 \u0438\u0437\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u0441\u0440\u0435\u0434\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u043e\u043a\u0430\u043c\u0438 \u0438 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.mozilla.org/security/advisories/mfsa2019-13/\nhttps://www.mozilla.org/security/advisories/mfsa2019-14/\nhttps://www.mozilla.org/security/advisories/mfsa2019-15/\nhttps://security-tracker.debian.org/tracker/CVE-2019-9818",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-362",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
CNVD-2019-16995
Vulnerability from cnvd - Published: 2019-06-11目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/
| Name | ['Mozilla Firefox <67', 'Mozilla Firefox ESR <60.7'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2019-9818",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9818"
}
},
"description": "Mozilla Firefox\u548cMozilla Firefox ESR\u90fd\u662f\u7f8e\u56fdMozilla\uff08Mozilla\uff09\u57fa\u91d1\u4f1a\u7684\u4ea7\u54c1\u3002Mozilla Firefox\u662f\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002Mozilla Firefox ESR\u662fFirefox(Web\u6d4f\u89c8\u5668)\u7684\u4e00\u4e2a\u5ef6\u957f\u652f\u6301\u7248\u672c\u3002crash generation server\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u5d29\u6e83\u4fe1\u606f\u751f\u6210\u670d\u52a1\u5668\u3002\n\n\u57fa\u4e8eWindows\u5e73\u53f0\u7684Mozilla Firefox 67\u4e4b\u524d\u7248\u672c\u548cFirefox ESR 60.7\u4e4b\u524d\u7248\u672c\u4e2d\u7684crash generation server\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5bf9\u7cfb\u7edf\u8d44\u6e90\uff08\u5982\u5185\u5b58\u3001\u78c1\u76d8\u7a7a\u95f4\u3001\u6587\u4ef6\u7b49\uff09\u7684\u7ba1\u7406\u4e0d\u5f53\u3002\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u7684WEB\u9875\u8bf7\u6c42\uff0c\u8bf1\u4f7f\u7528\u6237\u89e3\u6790\uff0c\u53ef\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u6216\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "Thomas Imbert",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2019-13/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-16995",
"openTime": "2019-06-11",
"patchDescription": "Mozilla Firefox\u548cMozilla Firefox ESR\u90fd\u662f\u7f8e\u56fdMozilla\uff08Mozilla\uff09\u57fa\u91d1\u4f1a\u7684\u4ea7\u54c1\u3002Mozilla Firefox\u662f\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002Mozilla Firefox ESR\u662fFirefox(Web\u6d4f\u89c8\u5668)\u7684\u4e00\u4e2a\u5ef6\u957f\u652f\u6301\u7248\u672c\u3002crash generation server\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u5d29\u6e83\u4fe1\u606f\u751f\u6210\u670d\u52a1\u5668\u3002\r\n\r\n\u57fa\u4e8eWindows\u5e73\u53f0\u7684Mozilla Firefox 67\u4e4b\u524d\u7248\u672c\u548cFirefox ESR 60.7\u4e4b\u524d\u7248\u672c\u4e2d\u7684crash generation server\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5bf9\u7cfb\u7edf\u8d44\u6e90\uff08\u5982\u5185\u5b58\u3001\u78c1\u76d8\u7a7a\u95f4\u3001\u6587\u4ef6\u7b49\uff09\u7684\u7ba1\u7406\u4e0d\u5f53\u3002\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u7684WEB\u9875\u8bf7\u6c42\uff0c\u8bf1\u4f7f\u7528\u6237\u89e3\u6790\uff0c\u53ef\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u6216\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Mozilla Firefox\u548cMozilla Firefox ESR crash generation server\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Mozilla Firefox \u003c67",
"Mozilla Firefox ESR \u003c60.7"
]
},
"referenceLink": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/",
"serverity": "\u9ad8",
"submitTime": "2019-05-23",
"title": "Mozilla Firefox\u548cMozilla Firefox ESR crash generation server\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e"
}
FKIE_CVE-2019-9818
Vulnerability from fkie_nvd - Published: 2019-07-23 14:15 - Updated: 2024-11-21 04:52| URL | Tags | ||
|---|---|---|---|
| security@mozilla.org | https://bugzilla.mozilla.org/show_bug.cgi?id=1542581 | Issue Tracking, Permissions Required | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2019-13/ | Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2019-14/ | Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2019-15/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=1542581 | Issue Tracking, Permissions Required | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2019-13/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2019-14/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2019-15/ | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | firefox | * | |
| mozilla | firefox_esr | * | |
| mozilla | thunderbird | * | |
| microsoft | windows | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83DEE955-3E09-489F-BE40-2FD33EACF436",
"versionEndExcluding": "67.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AE86A15-DB39-4AA7-992B-FEBC77C52CF3",
"versionEndExcluding": "60.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD578CD5-6B23-4339-BE6F-4FC336F890B2",
"versionEndExcluding": "60.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7."
},
{
"lang": "es",
"value": "Se presenta una condici\u00f3n de carrera en el servidor de generaci\u00f3n de bloqueo utilizado para generar datos por el reportero de bloqueo. Este problema puede conllevar a un uso de la memoria previamente liberada en el proceso principal, lo que resulta en un bloqueo explotable potencialmente y un escape del sandbox. * Nota: esta vulnerabilidad solo afecta a Windows. Otros sistemas operativos no est\u00e1n afectados. *. Esta vulnerabilidad afecta a Thunderbird anterior a versi\u00f3n 60.7, Firefox anterior a versi\u00f3n 67 y Firefox ESR anterior a versi\u00f3n 60.7."
}
],
"id": "CVE-2019-9818",
"lastModified": "2024-11-21T04:52:22.320",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-07-23T14:15:17.280",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542581"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-13/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-14/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-15/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Permissions Required"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542581"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-13/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-14/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-15/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
},
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-R9P3-38M2-QXQ8
Vulnerability from github – Published: 2022-05-24 16:51 – Updated: 2022-05-24 16:51A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. Note: this vulnerability only affects Windows. Other operating systems are unaffected.. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
{
"affected": [],
"aliases": [
"CVE-2019-9818"
],
"database_specific": {
"cwe_ids": [
"CWE-362"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-07-23T14:15:00Z",
"severity": "MODERATE"
},
"details": "A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"id": "GHSA-r9p3-38m2-qxq8",
"modified": "2022-05-24T16:51:03Z",
"published": "2022-05-24T16:51:03Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9818"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542581"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-13"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-14"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-15"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2019-9818
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2019-9818",
"description": "A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"id": "GSD-2019-9818",
"references": [
"https://www.suse.com/security/cve/CVE-2019-9818.html",
"https://advisories.mageia.org/CVE-2019-9818.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-9818"
],
"details": "A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"id": "GSD-2019-9818",
"modified": "2023-12-13T01:23:47.135582Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2019-9818",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.7"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "67"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.7"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use-after-free in crash generation server"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-13/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-13/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-15/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-15/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-14/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-14/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542581",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542581"
}
]
}
},
"mozilla.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2019-9818"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.7"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.7"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "67"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. \u003cbr\u003e*Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox ESR \u003c 60.7, and Firefox \u003c 67."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use-after-free in crash generation server"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2019-14/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2019-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2019-15/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542581"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "67.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "60.7",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "60.7",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2019-9818"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
},
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-15/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-15/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-14/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-14/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-13/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-13/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542581",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Permissions Required"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542581"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 6.0
}
},
"lastModifiedDate": "2021-07-21T11:39Z",
"publishedDate": "2019-07-23T14:15Z"
}
}
}
OPENSUSE-SU-2019:1534-1
Vulnerability from csaf_opensuse - Published: 2019-06-10 09:32 - Updated: 2019-06-10 09:32| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for MozillaFirefox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for MozillaFirefox fixes the following issues:\n\nMozillaFirefox was updated to 60.7.0esr (boo#1135824 MFSA 2019-14):\n\n* CVE-2018-18511: Cross-origin theft of images with ImageBitmapRenderingContext\n* CVE-2019-11691: Use-after-free in XMLHttpRequest\n* CVE-2019-11692: Use-after-free removing listeners in the event listener manager\n* CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux\n* CVE-2019-11694: (Windows only) Uninitialized memory memory leakage in Windows sandbox\n* CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks\n* CVE-2019-5798: Out-of-bounds read in Skia\n* CVE-2019-7317: Use-after-free in png_image_free of libpng library\n* CVE-2019-9797: Cross-origin theft of images with createImageBitmap\n* CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7\n* CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS\n* CVE-2019-9816: Type confusion with object groups and UnboxedObjects\n* CVE-2019-9817: Stealing of cross-domain images using canvas\n* CVE-2019-9818: (Windows only) Use-after-free in crash generation server\n* CVE-2019-9819: Compartment mismatch with fetch API\n* CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell\n* CVE-2019-9821: Use-after-free in AssertWorkerThread\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-1534",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1534-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:1534-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:1534-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7"
},
{
"category": "self",
"summary": "SUSE Bug 1135824",
"url": "https://bugzilla.suse.com/1135824"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18511 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11691 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11692 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11692/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11693 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11694 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11694/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11698 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11698/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5798 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5798/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7317 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7317/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9797 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9797/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9800 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9800/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9816 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9817 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9818 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9818/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9819 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9820 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9820/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9821 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9821/"
}
],
"title": "Security update for MozillaFirefox",
"tracking": {
"current_release_date": "2019-06-10T09:32:29Z",
"generator": {
"date": "2019-06-10T09:32:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:1534-1",
"initial_release_date": "2019-06-10T09:32:29Z",
"revision_history": [
{
"date": "2019-06-10T09:32:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"product": {
"name": "MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"product_id": "MozillaFirefox-60.7.0-lp150.3.54.5.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"product": {
"name": "MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"product_id": "MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"product": {
"name": "MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"product_id": "MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"product": {
"name": "MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"product_id": "MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"product": {
"name": "MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"product_id": "MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64",
"product": {
"name": "MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64",
"product_id": "MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-60.7.0-lp150.3.54.5.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64"
},
"product_reference": "MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64"
},
"product_reference": "MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64"
},
"product_reference": "MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64"
},
"product_reference": "MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64"
},
"product_reference": "MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
},
"product_reference": "MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-18511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18511"
}
],
"notes": [
{
"category": "general",
"text": "Cross-origin images can be read from a canvas element in violation of the same-origin policy using the transferFromImageBitmap method. *Note: This only affects Firefox 65. Previous versions are unaffected.*. This vulnerability affects Firefox \u003c 65.0.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18511",
"url": "https://www.suse.com/security/cve/CVE-2018-18511"
},
{
"category": "external",
"summary": "SUSE Bug 1125330 for CVE-2018-18511",
"url": "https://bugzilla.suse.com/1125330"
},
{
"category": "external",
"summary": "SUSE Bug 1125396 for CVE-2018-18511",
"url": "https://bugzilla.suse.com/1125396"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2018-18511",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "moderate"
}
],
"title": "CVE-2018-18511"
},
{
"cve": "CVE-2019-11691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11691"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11691",
"url": "https://www.suse.com/security/cve/CVE-2019-11691"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-11691",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-11691"
},
{
"cve": "CVE-2019-11692",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11692"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11692",
"url": "https://www.suse.com/security/cve/CVE-2019-11692"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-11692",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-11692"
},
{
"cve": "CVE-2019-11693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11693"
}
],
"notes": [
{
"category": "general",
"text": "The bufferdata function in WebGL is vulnerable to a buffer overflow with specific graphics drivers on Linux. This could result in malicious content freezing a tab or triggering a potentially exploitable crash. *Note: this issue only occurs on Linux. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11693",
"url": "https://www.suse.com/security/cve/CVE-2019-11693"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-11693",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-11693"
},
{
"cve": "CVE-2019-11694",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11694"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists in the Windows sandbox where an uninitialized value in memory can be leaked to a renderer from a broker when making a call to access an otherwise unavailable file. This results in the potential leaking of information stored at that memory location. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11694",
"url": "https://www.suse.com/security/cve/CVE-2019-11694"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-11694",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-11694"
},
{
"cve": "CVE-2019-11698",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11698"
}
],
"notes": [
{
"category": "general",
"text": "If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user\u0027s browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11698",
"url": "https://www.suse.com/security/cve/CVE-2019-11698"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-11698",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-11698"
},
{
"cve": "CVE-2019-5798",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5798"
}
],
"notes": [
{
"category": "general",
"text": "Lack of correct bounds checking in Skia in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5798",
"url": "https://www.suse.com/security/cve/CVE-2019-5798"
},
{
"category": "external",
"summary": "SUSE Bug 1129059 for CVE-2019-5798",
"url": "https://bugzilla.suse.com/1129059"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-5798",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "moderate"
}
],
"title": "CVE-2019-5798"
},
{
"cve": "CVE-2019-7317",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7317"
}
],
"notes": [
{
"category": "general",
"text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7317",
"url": "https://www.suse.com/security/cve/CVE-2019-7317"
},
{
"category": "external",
"summary": "SUSE Bug 1124211 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1124211"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1135824"
},
{
"category": "external",
"summary": "SUSE Bug 1141780 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1141780"
},
{
"category": "external",
"summary": "SUSE Bug 1147021 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1147021"
},
{
"category": "external",
"summary": "SUSE Bug 1165297 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1165297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "low"
}
],
"title": "CVE-2019-7317"
},
{
"cve": "CVE-2019-9797",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9797"
}
],
"notes": [
{
"category": "general",
"text": "Cross-origin images can be read in violation of the same-origin policy by exporting an image after using createImageBitmap to read the image and then rendering the resulting bitmap image within a canvas element. This vulnerability affects Firefox \u003c 66.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9797",
"url": "https://www.suse.com/security/cve/CVE-2019-9797"
},
{
"category": "external",
"summary": "SUSE Bug 1129821 for CVE-2019-9797",
"url": "https://bugzilla.suse.com/1129821"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-9797",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-9797"
},
{
"cve": "CVE-2019-9800",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9800"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 66, Firefox ESR 60.6, and Thunderbird 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9800",
"url": "https://www.suse.com/security/cve/CVE-2019-9800"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-9800",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-9800"
},
{
"cve": "CVE-2019-9815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9815"
}
],
"notes": [
{
"category": "general",
"text": "If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thread and any worker threads. *Note: users need to update to macOS 10.14.5 in order to take advantage of this change.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9815",
"url": "https://www.suse.com/security/cve/CVE-2019-9815"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-9815",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-9815"
},
{
"cve": "CVE-2019-9816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9816"
}
],
"notes": [
{
"category": "general",
"text": "A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9816",
"url": "https://www.suse.com/security/cve/CVE-2019-9816"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-9816",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-9816"
},
{
"cve": "CVE-2019-9817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9817"
}
],
"notes": [
{
"category": "general",
"text": "Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9817",
"url": "https://www.suse.com/security/cve/CVE-2019-9817"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-9817",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-9817"
},
{
"cve": "CVE-2019-9818",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9818"
}
],
"notes": [
{
"category": "general",
"text": "A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9818",
"url": "https://www.suse.com/security/cve/CVE-2019-9818"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-9818",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-9818"
},
{
"cve": "CVE-2019-9819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9819"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9819",
"url": "https://www.suse.com/security/cve/CVE-2019-9819"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-9819",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-9819"
},
{
"cve": "CVE-2019-9820",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9820"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9820",
"url": "https://www.suse.com/security/cve/CVE-2019-9820"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-9820",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-9820"
},
{
"cve": "CVE-2019-9821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9821"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur in AssertWorkerThread due to a race condition with shared workers. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 67.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9821",
"url": "https://www.suse.com/security/cve/CVE-2019-9821"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-9821",
"url": "https://bugzilla.suse.com/1135824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaFirefox-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-devel-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-common-60.7.0-lp150.3.54.5.x86_64",
"openSUSE Leap 15.0:MozillaFirefox-translations-other-60.7.0-lp150.3.54.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-10T09:32:29Z",
"details": "important"
}
],
"title": "CVE-2019-9821"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.