Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Friday June 21 2019, @04:41AM   Printer-friendly
from the another-day-another-zero-day dept.

Submitted via IRC for Bytram

Mozilla Firefox 67.0.3 Patches Actively Exploited Zero-Day

Mozilla released Firefox 67.0.3 and Firefox ESR 60.7.1 to patch an actively exploited and critical severity vulnerability which could allow attackers to remotely execute arbitrary code on machines running vulnerable Firefox versions.

As Mozilla's security advisory says, the Firefox developers are "aware of targeted attacks in the wild abusing this flaw" which could allow attackers who exploit this vulnerability to take control of affected systems.

The Firefox and Firefox ESR zero-day flaw fixed by Mozilla was reported by Google Project Zero's Samuel Groß and the Coinbase Security team.

The type confusion vulnerability tracked as CVE-2019-11707occurs "when manipulating JavaScript objects due to issues in Array.pop."

Attackers could potentially trigger the type confusion by deceiving users of unpatched Firefox versions into visiting a maliciously crafted web page and, subsequently, executing arbitrary code on their systems.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) also issued an alert advising users "to review the Mozilla Security Advisory for Firefox 67.0.3 and Firefox ESR 60.7.1 and apply the necessary updates."


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2, Informative) by Anonymous Coward on Friday June 21 2019, @05:16AM (5 children)

    by Anonymous Coward on Friday June 21 2019, @05:16AM (#858438)

    lol, except you're not: there a 67.0.4 now ... another critical security hole in javascript.

    Starting Score:    0  points
    Moderation   +2  
       Informative=1, Funny=1, Total=2
    Extra 'Informative' Modifier   0  

    Total Score:   2  
  • (Score: 1, Offtopic) by realDonaldTrump on Friday June 21 2019, @06:18AM (4 children)

    by realDonaldTrump (6614) on Friday June 21 2019, @06:18AM (#858465) Homepage Journal

    This is a Cyber that's changing faster than our "wonderful" Soylent News Submitters & Editors -- and many of the Submitters, that actually get their Message through are Editors -- can keep up. They're changing it because of "security." While my military is working with 1970s Cyber. For ICBMs, for many things. You think ICBM, it's the ultimate in security, right? But, very old Cyber. Crazy!!!!

    • (Score: 1, Offtopic) by realDonaldTrump on Friday June 21 2019, @06:21AM (3 children)

      by realDonaldTrump (6614) on Friday June 21 2019, @06:21AM (#858466) Homepage Journal

      (cont) By the way, the Link. foxnews.com/tech/americas-nuke-program-runs-on-floppy-disks [foxnews.com]

      • (Score: 2) by PiMuNu on Friday June 21 2019, @11:03AM (2 children)

        by PiMuNu (3823) on Friday June 21 2019, @11:03AM (#858502)

        I saw RoboCop, I mean that was just a city goverment and they had robots to do the policing. Now we find out that federal government's ICBMs can't even afford up-to-date computers. Crazy!

        • (Score: 2) by Freeman on Friday June 21 2019, @02:08PM (1 child)

          by Freeman (732) on Friday June 21 2019, @02:08PM (#858539) Journal

          Don't fix it, if it ain't broke. Sure, that saying can get you in trouble sometimes, but so many times it's too true. At this point, I'd be afraid someone would have the bright idea to put the ICBM control computer on the internet. IoTs are so secure!

          --
          Joshua 1:9 "Be strong and of a good courage; be not afraid, neither be thou dismayed: for the Lord thy God is with thee"
          • (Score: 0) by Anonymous Coward on Friday June 21 2019, @11:48PM

            by Anonymous Coward on Friday June 21 2019, @11:48PM (#858704)

            They already have these for the 26 pin floppy cable (the pin version of the 26 pin Shugart edge connector?)

            How hard would it be to engineer one for these nuclear systems? If you can't use USB/SD or capacitive memory, like flash, there is still FRAM, available in 8 pin SPI packages. 512K chips in a custom module that plugs into a rad-hardened floppy emulator seems perfect.

            And I am pretty sure the STM32 has a rad hardened variant now too, doesn't it?

            This is like money sitting on the table for someone talented enough to build it.