Kaspersky ID:
KLA48839
Дата обнаружения:
11/04/2023
Обновлено:
25/01/2024

Описание

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Security UI vulnerability in Fullscreen notification can be exploited to spoof user interface.
  2. Memory corruption vulnerability in Garbage Collection can be exploited remotely to cause denial of service or execute arbitrary code.
  3. Data race vulnerability in font initialization can be exploited to obtain sensitive information or execute arbitrary code.
  4. Security vulnerability can be exploited to bypass security restrictions.
  5. Information disclosure vulnerability in Private Browsing on Andoroid can be exploited to obtain sensitive information.
  6. Out of bounds vulnerability in WebGL on macOS can be exploited to cause denial of service.
  7. Remote code execution vulnerability in Maintenance Service can be exploited remotely to execute arbitrary code.
  8. Memory corruption vulnerability in Garbage Collection compaction can be exploited remotely to cause denial of service or execute arbitrary code.
  9. Invalid free pointer in the memory manager can be remotely exploited to cause a denial of service or the execution of arbitrary code.
  10. Information disclosure vulnerability in Save As dialog on Windows can be exploited to obtain sensitive information.
  11. Security vulnerability in the ARM64 Ion compiler can be exploited to bypass security restrictions.
  12. Security vulnerability in the bind function can be exploited to bypass security restrictions.
  13. Security UI vulnerability in Fullscreen notification on Android can be exploited to spoof user interface.
  14. Use after free vulnerability in debugging APIs can be exploited to cause denial of service or execute arbitrary code.
  15. Remote code execution vulnerability can be exploited remotely to execute arbitrary code.
  16. Information disclosure vulnerability in WebExtension can be exploited to obtain sensitive information.
  17. Memory safety vulnerability can be exploited to execute arbitrary code.
  18. Double-free memory address vulnerability in libwebp can be exploited remotely to cause denial of service or execute arbitrary code.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2023-29533
    warning
  • CVE-2023-29544
    high
  • CVE-2023-29537
    critical
  • CVE-2023-29547
    high
  • CVE-2023-29546
    high
  • CVE-2023-29531
    critical
  • CVE-2023-29532
    high
  • CVE-2023-29535
    high
  • CVE-2023-29536
    critical
  • CVE-2023-29545
    high
  • CVE-2023-29548
    high
  • CVE-2023-29541
    critical
  • CVE-2023-29549
    high
  • CVE-2023-29534
    critical
  • CVE-2023-29543
    critical
  • CVE-2023-29542
    critical
  • CVE-2023-29539
    critical
  • CVE-2023-29540
    high
  • CVE-2023-29538
    warning
  • CVE-2023-29551
    critical
  • CVE-2023-29550
    critical
  • CVE-2023-1999
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.