CVE-2019-9802 PUBLISHED

If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data. This vulnerability affects Firefox < 66.

EPSS 0.21% · 43.6th percentile

Risk Scores

EPSS Score
0.21%
43.6th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSfirefox0, 65.0.1+build2-0ubuntu0.16.04.1, 65.0+build2-0ubuntu0.16.04.1
Ubuntu:20.04:LTSmozjs5252.9.1-1ubuntu3, 0, 52.9.1-1build1
Ubuntu:18.04:LTSmozjs3838.8.0~repack1-0ubuntu4, 38.8.0~repack1-0ubuntu3, 38.8.0~repack1-0ubuntu1
Ubuntu:14.04:LTSfirefox57.0.1+build2-0ubuntu0.14.04.1, 57.0.3+build1-0ubuntu0.14.04.1, 57.0.4+build1-0ubuntu0.14.04.1
Ubuntu:18.04:LTSmozjs5252.3.1-7fakesync1, 52.8.1-0ubuntu0.18.04.1, 52.9.1-0ubuntu0.18.04.1
Ubuntu:18.04:LTSfirefox62.0+build2-0ubuntu0.18.04.5, 62.0.3+build1-0ubuntu0.18.04.1, 63.0+build2-0ubuntu0.18.04.2

Timeline

References

Open in Interactive Console →