Kaspersky ID:
KLA62089
Detect Date:
11/21/2023
Updated:
11/23/2023

Description

Multiple vulnerabilities were found in Mozilla Firefox ESR. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, spoof user interface, obtain sensitive information, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Out of bounds memory access vulnerability in WebGL2 blitFramebuffer can be exploited to cause denial of service.
  2. Use after free vulnerability in MessagePort::Entangled can be exploited to cause denial of service or execute arbitrary code.
  3. Clickjacking permission prompts vulnerability in fullscreen transition can be exploited remotely to spoof user interface.
  4. Use after free vulnerability in ReadableByteStreamQueueEntry::Buffer can be exploited to cause denial of service or execute arbitrary code.
  5. Information disclosure vulnerability for X11 can be exploited to obtain sensitive information.
  6. Security feature bypass vulnerability can be exploited remotely to bypass security restrictions.
  7. Memory safety vulnerability can be exploited to execute arbitrary code.

Original advisories

Related products

CVE list

  • CVE-2023-6212
    unknown
  • CVE-2023-6204
    unknown
  • CVE-2023-6208
    unknown
  • CVE-2023-6209
    unknown
  • CVE-2023-6207
    unknown
  • CVE-2023-6205
    unknown
  • CVE-2023-6206
    unknown

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky IT Security Calculator
Calculate
Check now
Learn more about cybersecurity on Kaspersky Encyclopedia
For free
Learn more
Confirm changes?
Your message has been sent successfully.