Kaspersky ID:
KLA71397
検出日:
08/06/2024
更新日:
09/19/2024

説明

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, cause denial of service, obtain sensitive information, execute arbitrary code, perform cross-site scripting attack, gain privileges.

Below is a complete list of vulnerabilities:

  1. Security UI vulnerability in the date picker can be exploited to spoof user interface and bypass security restrictions.
  2. Security UI vulnerability in select option on Android can be exploited to spoof user interface and bypass security restrictions.
  3. Security UI vulnerability in select option of fullscreen notification dialog can be exploited to spoof user interface.
  4. Out of bounds memory access vulnerability in graphics shared memory handling can be exploited to cause denial of service.
  5. Security vulnerability in PK11_Encrypt using CKM_CHACHA20 on Intel Sandy Bridge machines can exploited to obtain sensitive information.
  6. Use after free vulnerability in incomplete WebAssembly exception handing can be exploited to cause denial of service or execute arbitrary code.
  7. Security vulnerability in web extension with StreamFilter can be exploited to obtain sensitive information, cause denial of service or execute arbitrary code.
  8. Cross Site Scripting (XSS) vulnerability in Enhanced Tracking Protection can be exploited to execute arbitrary code and spoof user interface.
  9. Use after free vulnerability in IndexedDB can be exploited to cause denial of service or execute arbitrary code.
  10. Out of bounds read vulnerability in editor component can be exploited to cause denial of service.
  11. Use after free vulnerability in JavaScript code coverage collection can be exploited to cause denial of service or execute arbitrary code.
  12. Type confusion vulnerability in WebAssembly can be exploited to execute arbitrary code.
  13. Uninitialized memory vulnerability in ANGLE used by WebGL can be exploited to obtain sensitive information.
  14. Use after free vulnerability in JavaScript garbage collection can be exploited to cause denial of service or execute arbitrary code.
  15. Security vulnerability in Clipboard can be exploited to bypass security restrictions.

オリジナルアドバイザリー

関連製品

CVEリスト

  • CVE-2024-7529
    high
  • CVE-2024-7523
    critical
  • CVE-2024-7518
    high
  • CVE-2024-7519
    critical
  • CVE-2024-7531
    high
  • CVE-2024-7521
    critical
  • CVE-2024-7525
    critical
  • CVE-2024-7524
    high
  • CVE-2024-7528
    critical
  • CVE-2024-7522
    critical
  • CVE-2024-7530
    critical
  • CVE-2024-7520
    critical
  • CVE-2024-7526
    high
  • CVE-2024-7527
    critical
  • CVE-2024-8900
    warning

も参照してください

お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com

この脆弱性についての記述に不正確な点がありますか? お知らせください!
Kaspersky IT Security Calculator
も参照してください
新しいカスペルスキー
あなたのデジタルライフを守る
も参照してください
Do you want to save your changes?
Your message has been sent successfully.