Уязвимость обхода песочницы в Thunderbird и Firefox через недостаточную аутентификацию каналов межпроцессной коммуникации (IPC)
Описание
Ранее добавленная аутентификация для устранения уязвимости в межпроцессном взаимодействии (IPC) CVE-2011-3079 оказалась недостаточной для каналов, созданных после запуска процесса IPC. Это приводит к некорректному применению аутентификации к более поздним каналам. Данное обстоятельство может позволить злоумышленнику выйти из песочницы через каналы IPC из-за отсутствия валидации сообщений в процессе обработки.
Затронутые версии ПО
- Thunderbird версии ниже 60.5
- Firefox ESR версии ниже 60.5
- Firefox версии ниже 65
Тип уязвимости
Выход из песочницы
Ссылки
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Issue TrackingPatchVendor Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
10 Critical
CVSS3
7.5 High
CVSS2
Дефекты
Связанные уязвимости
An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
An earlier fix for an Inter-process Communication (IPC) vulnerability, ...
An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками реализации механизма аутентификации межпроцессного взаимодействия (IPC), позволяющая нарушителю повысить свои привилегии и выйти из изолированной программной среды
EPSS
10 Critical
CVSS3
7.5 High
CVSS2