Kaspersky ID:
KLA71397
Detect Date:
08/06/2024
Updated:
09/19/2024

Description

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, cause denial of service, obtain sensitive information, execute arbitrary code, perform cross-site scripting attack, gain privileges.

Below is a complete list of vulnerabilities:

  1. Security UI vulnerability in the date picker can be exploited to spoof user interface and bypass security restrictions.
  2. Security UI vulnerability in select option on Android can be exploited to spoof user interface and bypass security restrictions.
  3. Security UI vulnerability in select option of fullscreen notification dialog can be exploited to spoof user interface.
  4. Out of bounds memory access vulnerability in graphics shared memory handling can be exploited to cause denial of service.
  5. Security vulnerability in PK11_Encrypt using CKM_CHACHA20 on Intel Sandy Bridge machines can exploited to obtain sensitive information.
  6. Use after free vulnerability in incomplete WebAssembly exception handing can be exploited to cause denial of service or execute arbitrary code.
  7. Security vulnerability in web extension with StreamFilter can be exploited to obtain sensitive information, cause denial of service or execute arbitrary code.
  8. Cross Site Scripting (XSS) vulnerability in Enhanced Tracking Protection can be exploited to execute arbitrary code and spoof user interface.
  9. Use after free vulnerability in IndexedDB can be exploited to cause denial of service or execute arbitrary code.
  10. Out of bounds read vulnerability in editor component can be exploited to cause denial of service.
  11. Use after free vulnerability in JavaScript code coverage collection can be exploited to cause denial of service or execute arbitrary code.
  12. Type confusion vulnerability in WebAssembly can be exploited to execute arbitrary code.
  13. Uninitialized memory vulnerability in ANGLE used by WebGL can be exploited to obtain sensitive information.
  14. Use after free vulnerability in JavaScript garbage collection can be exploited to cause denial of service or execute arbitrary code.
  15. Security vulnerability in Clipboard can be exploited to bypass security restrictions.

Original advisories

Related products

CVE list

  • CVE-2024-7529
    high
  • CVE-2024-7523
    critical
  • CVE-2024-7518
    high
  • CVE-2024-7519
    critical
  • CVE-2024-7531
    high
  • CVE-2024-7521
    critical
  • CVE-2024-7525
    critical
  • CVE-2024-7524
    high
  • CVE-2024-7528
    critical
  • CVE-2024-7522
    critical
  • CVE-2024-7530
    critical
  • CVE-2024-7520
    critical
  • CVE-2024-7526
    high
  • CVE-2024-7527
    critical
  • CVE-2024-8900
    warning

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.