Severity High
Patch available YES
Number of vulnerabilities 8
CVE ID CVE-2020-12399
CVE-2020-12405
CVE-2020-12406
CVE-2020-12407
CVE-2020-12408
CVE-2020-12409
CVE-2020-12410
CVE-2020-12411
CWE ID CWE-362
CWE-416
CWE-843
CWE-401
CWE-451
CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Arch Linux

Operating systems & Components /
Operating system
Vendor Arch Linux

Security Advisory

2) Use-after-free

Severity: High

CVSSv3:
7.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID:
CVE-2020-12405

CWE-ID:
CWE-416 – Use After Free

Exploit availability:
No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when in SharedWorkerService due to a race condition. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update the affected package firefox to version 77.0-1.

Vulnerable software versions

Arch Linux:

CPE

External links

https://security.archlinux.org/advisory/ASA-202006-1

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Type Confusion

Severity: High

CVSSv3:
7.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID:
CVE-2020-12406

CWE-ID:
CWE-843 – Access of Resource Using Incompatible Type (‘Type Confusion’)

Exploit availability:
No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a type confusion error during unboxed JavaScript objects removal. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a type confusion error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package firefox to version 77.0-1.

Vulnerable software versions

Arch Linux:

CPE

External links

https://security.archlinux.org/advisory/ASA-202006-1

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Spoofing attack

Severity: Medium

CVSSv3:
4.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C] [PCI]

CVE-ID:
CVE-2020-12408

CWE-ID:
CWE-451 – User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)

Exploit availability:
No

Description

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data when browsing a document hosted on an IP address. A remote attacker can trick the victim to visit a specially crafted website and flip flip domain and path information in the address bar.

Mitigation

Update the affected package firefox to version 77.0-1.

Vulnerable software versions

Arch Linux:

CPE

External links

https://security.archlinux.org/advisory/ASA-202006-1

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Buffer overflow

Severity: High

CVSSv3:
7.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID:
CVE-2020-12410

CWE-ID:
CWE-119 – Improper Restriction of Operations within the Bounds of a Memory Buffer

Exploit availability:
No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package firefox to version 77.0-1.

Vulnerable software versions

Arch Linux:

CPE

External links

https://security.archlinux.org/advisory/ASA-202006-1

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Buffer overflow

Severity: High

CVSSv3:
7.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID:
CVE-2020-12411

CWE-ID:
CWE-119 – Improper Restriction of Operations within the Bounds of a Memory Buffer

Exploit availability:
No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The
vulnerability exists due to a boundary error when processing HTML
content. A remote attacker can create a specially crafted web page,
trick the victim into opening it, trigger memory corruption and execute
arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package firefox to version 77.0-1.

Vulnerable software versions

Arch Linux:

CPE

External links

https://security.archlinux.org/advisory/ASA-202006-1

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.





Source link

Write a comment:
*

Your email address will not be published.