Lucene search

K
redosRedosROS-20221118-04
HistoryNov 18, 2022 - 12:00 a.m.

ROS-20221118-04

2022-11-1800:00:00
redos.red-soft.ru
21
mozilla firefox
vulnerability
memory usage
service workers
remote attackers
arbitrary code
information leakage
popup handling
user confusion
spoofing attacks
unix

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

46.7%

A vulnerability in Mozilla Firefox browser is related to a post-release memory usage error in the
InputStream implementation. Exploitation of the vulnerability could allow an attacker acting remotely,
to force a victim to visit a specially crafted website, trigger a post-release usage error
and execute arbitrary code on the system

A vulnerability in the Mozilla Firefox browser is related to a bug in Service Workers. Exploitation of the vulnerability could
allow an attacker acting remotely to obtain information about the presence or length of a media file,
using media timing information from different sources combined with range queries

The vulnerability in the Mozilla Firefox browser involves incorrect handling of a series of calls to popup and
window.print(). Exploitation of the vulnerability could allow an attacker acting remotely to force the
browser into full-screen mode without the user seeing the notification prompt, which could lead to user confusion or
could lead to user confusion or spoofing attacks

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64firefox<= 102.5.0-1UNKNOWN

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

46.7%