Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2020-00723

Опубликовано: 09 июл. 2019
Источник: fstec
CVSS3: 6.5
CVSS2: 4.3
EPSS Средний

Описание

Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird связана с отсутствием защиты служебных данных. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, получить несанкционированный доступ к конфиденциальным данным через специально созданный HTML-файл

Вендор

Red Hat Inc.
Canonical Ltd.
Сообщество свободного программного обеспечения
ООО «РусБИТех-Астра»
Oracle Corp.
Novell Inc.
Mozilla Corp.
АО «Концерн ВНИИНС»

Наименование ПО

Red Hat Enterprise Linux
Ubuntu
Debian GNU/Linux
Astra Linux Special Edition
Oracle Linux
OpenSUSE Leap
SUSE Package Hub for SUSE Linux Enterprise
Thunderbird
Firefox ESR
Firefox
ОС ОН «Стрелец»

Версия ПО

6 (Red Hat Enterprise Linux)
7 (Red Hat Enterprise Linux)
16.04 LTS (Ubuntu)
9 (Debian GNU/Linux)
18.04 LTS (Ubuntu)
18.10 (Ubuntu)
1.6 «Смоленск» (Astra Linux Special Edition)
19.04 (Ubuntu)
7 (Oracle Linux)
8 (Red Hat Enterprise Linux)
15.0 (OpenSUSE Leap)
15.1 (OpenSUSE Leap)
8 (Debian GNU/Linux)
12 (SUSE Package Hub for SUSE Linux Enterprise)
до 60.8 (Thunderbird)
до 60.8 (Firefox ESR)
до 68 (Firefox)
8 (poppler) (Oracle Linux)
6 (Oracle Linux)
1.0 (ОС ОН «Стрелец»)
до 16.01.2023 (ОС ОН «Стрелец»)

Тип ПО

Операционная система
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

Red Hat Inc. Red Hat Enterprise Linux 6
Red Hat Inc. Red Hat Enterprise Linux 7
Canonical Ltd. Ubuntu 16.04 LTS
Сообщество свободного программного обеспечения Debian GNU/Linux 9
Canonical Ltd. Ubuntu 18.04 LTS
Canonical Ltd. Ubuntu 18.10
ООО «РусБИТех-Астра» Astra Linux Special Edition 1.6 «Смоленск»
Canonical Ltd. Ubuntu 19.04
Oracle Corp. Oracle Linux 7
Red Hat Inc. Red Hat Enterprise Linux 8
Novell Inc. OpenSUSE Leap 15.0
Novell Inc. OpenSUSE Leap 15.1
Сообщество свободного программного обеспечения Debian GNU/Linux 8
Novell Inc. SUSE Package Hub for SUSE Linux Enterprise 12
Mozilla Corp. Thunderbird до 60.8
Mozilla Corp. Firefox ESR до 60.8
Mozilla Corp. Firefox до 68
Oracle Corp. Oracle Linux 8 (poppler)
Oracle Corp. Oracle Linux 6
АО «Концерн ВНИИНС» ОС ОН «Стрелец» 1.0
АО «Концерн ВНИИНС» ОС ОН «Стрелец» до 16.01.2023

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,3)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 6,5)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для Mozilla:
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
Для Debian:
Обновление программного обеспечения (пакета firefox) до 68.0-1 или более поздней версии
Для Astra Linux:
https://wiki.astralinux.ru/pages/viewpage.action?pageId=57444186
Для программных продуктов Novell Inc.
https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
Для Oracle:
https://linux.oracle.com/cve/CVE-2019-11730.html
Для SUSE:
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
Для Ubuntu:
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11730.html
https://usn.ubuntu.com/4054-1/
https://usn.ubuntu.com/4064-1/
Для Red Hat:
https://access.redhat.com/security/cve/cve-2019-11730
Для ОС ОН «Стрелец»: https://strelets.net/patchi-i-obnovleniya-bezopasnosti#kumulyativnoe-obnovlenie
Для ОС ОН «Стрелец»:
Обновление программного обеспечения firefox-esr до версии 91.13.0esr+repack-1~deb10u1.osnova1.strelets
Обновление программного обеспечения thunderbird до версии 1:91.13.0+repack-1~deb10u1.osnova1.strelets

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 95%
0.1971
Средний

6.5 Medium

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 6 лет назад

A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.

CVSS3: 6.1
redhat
больше 6 лет назад

A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.

CVSS3: 6.5
nvd
больше 6 лет назад

A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.

CVSS3: 6.5
debian
больше 6 лет назад

A vulnerability exists where if a user opens a locally saved HTML file ...

CVSS3: 6.5
github
больше 3 лет назад

A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.

EPSS

Процентиль: 95%
0.1971
Средний

6.5 Medium

CVSS3

4.3 Medium

CVSS2