|Number of vulnerabilities||1|
|CVE ID|| CVE-2019-11708
|Public exploit||This vulnerability is being exploited in the wild.|
|Vulnerable software versions||
Firefox ESR 60.7.1
Firefox ESR 60.7.0
Firefox ESR 60.6.3
Mozilla Firefox 67.0.3
Mozilla Firefox 67.0.2
Mozilla Firefox 67.0.1
Added information about in the wild exploitation of the vulnerability, raised severity risk to High.
The vulnerability allows a remote attacker to bypass sandbox restrictions.
The vulnerability exists due to insufficient vetting of parameters passed with the
IPC message between child and parent processes. A remote attacker can create a specially crafted web page that can make the non-sandboxed parent process open web content chosen by a compromised child process.
An attacker can combine this behavior along with another vulnerability to execute arbitrary code on the system with privileges on the current user.
Note, this vulnerability is being exploited in the wild along with SB2019061805 (CVE-2019-11707)Remediation
Install updates from vendor's website.External links