Kaspersky ID:
KLA11486
Date de la détection:
05/21/2019
Mis à jour:
01/28/2026

Description

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, cause denial of service, spoof user interface, perform cross-site scripting attack, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. A type confusion vulnerability can be exploited remotely to bypass security restrictions;
  2. A cross-origin resource sharing vulnerability can be exploited remotely via a canvas to obtain sensitive information;
  3. A use-after-free vulnerability in crash generation server can be exploited remotely to cause denial of service or bypass security restrictions;
  4. A compartment mismatch vulnerability can be exploited to cause denial of service;
  5. A use-after-free vulnerability in the chrome event handler can be exploited to cause denial of service;
  6. A use-after-free vulnerability in AssertWorkerThread can be exploited to cause denial of service;
  7. A use-after-free vulnerability in XMLHttpRequest can be exploited to cause denial of service;
  8. A use-after-free vulnerability in the event listener manager can be exploited to cause denial of service;
  9. A use-after-free vulnerability in the png_image_free function in the libpng library can be exploited to cause denial of service;
  10. A memory leakage vulnerability in the Windows sandbox can be exploited to obtain sensitive information;
  11. An unspecified vulnerability can be exploited remotely via specially crafted website to spoof user interface;
  12. An unspecified vulnerability can be exploited remotely via drag and drop of hyperlinks to and from bookmarks to obtain sensitive information;
  13. An unspecified vulnerability can be exploited to spoof user interface;
  14. An unspecified vulnerability can be exploited to perform cross-site scripting attacks;
  15. Multiple memory corruption vulnerabilities can be exploited to execute arbitrary code.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Produits associés

Liste CVE

  • CVE-2019-9816
    high
  • CVE-2019-9817
    high
  • CVE-2019-9818
    critical
  • CVE-2019-9819
    critical
  • CVE-2019-9820
    critical
  • CVE-2019-9821
    critical
  • CVE-2019-11691
    critical
  • CVE-2019-11692
    critical
  • CVE-2019-7317
    high
  • CVE-2019-11694
    critical
  • CVE-2019-11695
    warning
  • CVE-2019-11696
    critical
  • CVE-2019-11697
    high
  • CVE-2019-11698
    high
  • CVE-2019-11700
    high
  • CVE-2019-11699
    high
  • CVE-2019-11701
    high
  • CVE-2019-9814
    critical
  • CVE-2019-9800
    critical
  • CVE-2019-9815
    critical
  • CVE-2019-11693
    critical

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.