CVE-2019-11708

Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

History

02 Jul 2024, 17:02

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html - () http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html - Third Party Advisory, VDB Entry
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1559858 - Issue Tracking, Permissions Required, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=1559858 - Issue Tracking, Vendor Advisory
References () https://security.gentoo.org/glsa/201908-12 - () https://security.gentoo.org/glsa/201908-12 - Third Party Advisory

Information

Published : 2019-07-23 14:15

Updated : 2024-07-02 17:02


NVD link : CVE-2019-11708

Mitre link : CVE-2019-11708

CVE.ORG link : CVE-2019-11708


JSON object : View

Products Affected

mozilla

  • firefox_esr
  • thunderbird
  • firefox
CWE
CWE-20

Improper Input Validation