Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-9812

Опубликовано: 03 сент. 2019
Источник: redhat
CVSS3: 9.3
EPSS Низкий

Описание

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5firefoxOut of support scope
Red Hat Enterprise Linux 6firefoxFixedRHSA-2019:269412.09.2019
Red Hat Enterprise Linux 7firefoxFixedRHSA-2019:272912.09.2019
Red Hat Enterprise Linux 8firefoxFixedRHSA-2019:266304.09.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-250
https://bugzilla.redhat.com/show_bug.cgi?id=1748660Mozilla: Sandbox escape through Firefox Sync

EPSS

Процентиль: 66%
0.0052
Низкий

9.3 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.3
ubuntu
почти 6 лет назад

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

CVSS3: 9.3
nvd
почти 6 лет назад

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

CVSS3: 9.3
debian
почти 6 лет назад

Given a compromised sandboxed content process due to a separate vulner ...

CVSS3: 9.3
github
больше 3 лет назад

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

CVSS3: 9.3
fstec
почти 6 лет назад

Уязвимость компонента account.firefox.com веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю нарушить целостность данных или вызвать отказ в обслуживании

EPSS

Процентиль: 66%
0.0052
Низкий

9.3 Critical

CVSS3