CVE-2019-9802

If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data. This vulnerability affects Firefox < 66.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:52

Type Values Removed Values Added
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1415508 - Issue Tracking, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=1415508 - Issue Tracking, Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2019-07/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2019-07/ - Vendor Advisory

Information

Published : 2019-04-26 17:29

Updated : 2024-11-21 04:52


NVD link : CVE-2019-9802

Mitre link : CVE-2019-9802

CVE.ORG link : CVE-2019-9802


JSON object : View

Products Affected

mozilla

  • firefox
CWE
CWE-125

Out-of-bounds Read