SB2020021189 - OS Command Injection in firefox-esr (Alpine package)



SB2020021189 - OS Command Injection in firefox-esr (Alpine package)

Published: February 11, 2020

Security Bulletin ID SB2020021189
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) OS Command Injection (CVE-ID: CVE-2020-6799)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation when opening PDF links from other applications and Firefox is configured as a default PDF reader. A remote unauthenticated attacker can trick the victim into clicking on a specially crafted link and execute arbitrary OS commands on the system.

Note: This issue only affects Windows operating systems and when Firefox is configured as the default handler for non-default filetypes. Other operating systems are unaffected.


Remediation

Install update from vendor's website.