Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-11708

Опубликовано: 23 июл. 2019
Источник: debian
EPSS Средний

Описание

Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed67.0.4-1package
firefox-esrfixed60.7.2esr-1package
thunderbirdfixed1:60.7.2-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/#CVE-2019-11708

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-20/#CVE-2019-11708

EPSS

Процентиль: 98%
0.65682
Средний

Связанные уязвимости

CVSS3: 10
ubuntu
почти 6 лет назад

Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.

CVSS3: 10
redhat
около 6 лет назад

Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.

CVSS3: 10
nvd
почти 6 лет назад

Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.

suse-cvrf
около 6 лет назад

Security update for MozillaFirefox

suse-cvrf
около 6 лет назад

Security update for MozillaFirefox

EPSS

Процентиль: 98%
0.65682
Средний