Kaspersky ID:
KLA62518
検出日:
12/19/2023
更新日:
03/26/2025

説明

Multiple vulnerabilities were found in Mozilla Firefox ESR. Malicious users can exploit these vulnerabilities to bypass security restrictions, inject malicious code, execute arbitrary code, obtain sensitive information, spoof user interface, cause denial of service.

Below is a complete list of vulnerabilities:

  1. Security vulnerability in Symlinks can be exploited to bypass security restrictions.
  2. Security vulnerability in VideoBridge can be exploited to bypass security restrictions.
  3. Memory safety vulnerability can be exploited to execute arbitrary code.
  4. Use after free vulnerability in PR_GetIdentitiesLayer can be exploited to execute arbitrary code.
  5. Information disclosure vulnerability in EncryptingOutputStreams can be exploited to obtain sensitive information.
  6. Clickjacking permission prompts vulnerability in popup transition can be exploited remotely to spoof user interface.
  7. Heap buffer overflow vulnerability in nsTextFragment can be exploited to cause denial of service.
  8. Heap buffer overflow vulnerability in nsWindow::PickerOpen(void) can be exploited to cause denial of service.
  9. Heap buffer overflow vulnerability in WebGL ACE can be exploited to execute arbitrary code.
  10. Security vulnerability in ShutdownObserver can be exploited to bypass security restrictions.
  11. Use after free vulnerability in nsDNSService can be exploited to execute arbitrary code.

オリジナルアドバイザリー

関連製品

CVEリスト

  • CVE-2023-6857
    high
  • CVE-2023-6860
    high
  • CVE-2023-6864
    critical
  • CVE-2023-6859
    critical
  • CVE-2023-6865
    high
  • CVE-2023-6867
    high
  • CVE-2023-6858
    critical
  • CVE-2023-6861
    critical
  • CVE-2023-6856
    critical
  • CVE-2023-6863
    critical
  • CVE-2023-6862
    critical

も参照してください

お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com

この脆弱性についての記述に不正確な点がありますか? お知らせください!
Kaspersky IT Security Calculator
も参照してください
新しいカスペルスキー
あなたのデジタルライフを守る
も参照してください
Do you want to save your changes?
Your message has been sent successfully.