Month | Quarter | Year |
---|---|---|
#16 | #16 | #16 |
CVE-ID | CWE-ID | Type | Score |
---|---|---|---|
CVE-2019-9821 | CWE-416 | Use After Free | 8.1 |
A use-after-free vulnerability can occur in AssertWorkerThread due to a race condition with shared workers. This results in a potentially exploitable crash. |
|||
CVE-2019-9820 | CWE-416 | Use After Free | 9.8 |
A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. |
|||
CVE-2019-9819 | CWE-20 | Improper Input Validation | 9.8 |
A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. |
|||
CVE-2019-9817 | CWE-346 | Origin Validation Error | 5.3 |
Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. |
|||
CVE-2019-9816 | CWE-704 | Incorrect Type Conversion or Cast | 5.9 |
A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups.
Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases. |
|||
CVE-2019-9815 | CWE-362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') | 8.1 |
If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thread and any worker threads.
Note: users need to update to macOS 10.14.5 in order to take advantage of this change. |
|||
CVE-2019-9814 | CWE-119 | Improper Restriction of Operations within the Bounds of a Memory Buffer | 9.8 |
Mozilla developers and community members Christian Holler, Andrei Ciure, Julien Cristau, Jan de Mooij, Jan Varga, Marcia Knous, André Bargull, and Philipp reported memory safety bugs present in Firefox 66. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. |
|||
CVE-2019-9813 | CWE-704 | Incorrect Type Conversion or Cast | 8.8 |
Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. |
|||
CVE-2019-9811 | CWE-264 | Permissions, Privileges, and Access Controls | 8.3 |
As part of his winning Pwn2Own entry, Niklas Baumstark demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. |
|||
CVE-2019-9808 | CWE-346 | Origin Validation Error | 5.3 |
If WebRTC permission is requested from documents with data: or blob: URLs, the permission notifications do not properly display the originating domain. The notification states "Unknown origin" as the requestee, leading to user confusion about which site is asking for this permission. |