Lucene search

K
kasperskyKaspersky LabKLA12272
HistorySep 07, 2021 - 12:00 a.m.

KLA12272 Multiple vulnerabilities in Mozilla Firefox

2021-09-0700:00:00
Kaspersky Lab
threats.kaspersky.com
69
mozilla firefox
vulnerabilities
arbitrary code execution
denial of service
spoof user interface
ace
dos
sb
sui
memory safety
android
windows
address bar
cve-2021-38494
cve-2021-29993
cve-2021-38492
cve-2021-38491
cve-2021-38493
cve-2021-4221.

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.004

Percentile

74.7%

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A memory safety vulnerability can be exploited to execute arbitrary code.
  2. A security UI vulnerability for Android can be exploited to cause denial of service and spoof user interface.
  3. A code execution vulnerability for Windows can be exploited to execute arbitrary code.
  4. A security UI vulnerability can be exploited to spoof user interface.
  5. Security UI vulnerability in address bar on Android can be exploited via spoofing user interface.

Original advisories

MFSA2021-38

Related products

Mozilla-Firefox

CVE list

CVE-2021-38494 critical

CVE-2021-29993 critical

CVE-2021-38492 high

CVE-2021-38491 high

CVE-2021-38493 critical

CVE-2021-4221 warning

Solution

Update to the latest version

Download Firefox

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Mozilla Firefox earlier than 92

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.004

Percentile

74.7%