Kaspersky ID:
KLA11410
Detect Date:
01/29/2019
Updated:
01/22/2024

Description

Multiple vulnerabilities were found in Mozilla Firefox and Mozilla Firefox ESR. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, bypass security restrictions, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Use-after-free vulnerability in Mozilla Firefox can be exploited remotely via specially designed HTML5 stream to cause denial of service.
  2. Memory corruption vulnerability in Mozilla Firefox can be exploited remotely via specially designed JS code to cause denial of service.
  3. Out-of-bounds reading vulnerability can be exploited remotely via calling the graphic component to access the freed memory to obtain sensitive information.
  4. Inter-process Communication (IPC) vulnerability can be exploited remotely via attempt to communicate with the IPC object without validation to bypass security restrictions.
  5. Vulnerability in Mozilla Firefox related to auto-proxy configuration setting can be exploited locally to bypass security restrictions.
  6. Multiple memory corruption vulnerabilities can be exploited remotely to execute arbitrary code.

Original advisories

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2018-18500
    critical
  • CVE-2018-18503
    high
  • CVE-2018-18504
    critical
  • CVE-2018-18505
    critical
  • CVE-2018-18506
    warning
  • CVE-2018-18502
    critical
  • CVE-2018-18501
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.