Описание
When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
A flaw was found in Mozilla. The Mozilla Foundation's Security Advisory describes the following issue: When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution.
Отчет
Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | firefox | Affected | ||
Red Hat Enterprise Linux 10 | thunderbird | Affected | ||
Red Hat Enterprise Linux 6 | firefox | Out of support scope | ||
Red Hat Enterprise Linux 6 | thunderbird | Out of support scope | ||
Red Hat Enterprise Linux 7 | thunderbird | Out of support scope | ||
Red Hat Enterprise Linux 9 | firefox-flatpak-container | Affected | ||
Red Hat Enterprise Linux 9 | thunderbird-flatpak-container | Affected | ||
Red Hat Enterprise Linux 7 Extended Lifecycle Support | firefox | Fixed | RHSA-2024:10881 | 09.12.2024 |
Red Hat Enterprise Linux 8 | thunderbird | Fixed | RHSA-2024:10591 | 02.12.2024 |
Red Hat Enterprise Linux 8 | firefox | Fixed | RHSA-2024:10752 | 03.12.2024 |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
3.1 Low
CVSS3
Связанные уязвимости
When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
When handling keypress events, an attacker may have been able to trick ...
When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Уязвимость окна подтверждения "Открыть исполняемый файл" браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
3.1 Low
CVSS3