Kaspersky ID:
KLA11612
Data de detecção:
12/03/2019
Atualizado:
01/28/2026

Descrição

Multiple vulnerabilities were found in Mozilla Firefox ESR. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Race condition vulnerability in Resist Fingerprinting can be exploited remotely via specially designed website to cause denial of service;
  2. Stack corruption due to incorrect number of arguments in WebRTC code can be exploited remotely via specially designed website to cause denial of service;
  3. Incorrect temporary files access configuration of Mozilla updater service can be exploited locally to bypass security restrictions;
  4. Use-after-free vulnerability in DocShell can be exploited remotely via specially designed website to cause denial of service;
  5. Buffer overflow vulnerability in plain Firefox text serializer can be exploited remotely via specially designed website to cause denial of service;
  6. Use-after-free vulnerability in worker destruction can be exploited remotely via specially designed website to cause denial of service;
  7. Out of bounds write vulnerability in NSS can be exploited remotely via specially designed website to cause denial of service;

Comunicados originais

Exploração

Public exploits exist for this vulnerability.

Produtos relacionados

Lista de CVE

  • CVE-2019-17012
    critical
  • CVE-2019-17010
    critical
  • CVE-2019-13722
    high
  • CVE-2019-17009
    critical
  • CVE-2019-17011
    critical
  • CVE-2019-17005
    critical
  • CVE-2019-17008
    critical
  • CVE-2019-11745
    critical

Saiba mais

Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com

Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!
Kaspersky Next:
cibersegurança redefinida
Saber mais
Novo Kaspersky!
Sua vida dgital merece proteção completa!
Saber mais
Do you want to save your changes?
Your message has been sent successfully.