Submitted via IRC for Bytram
Mozilla Firefox 67.0.3 Patches Actively Exploited Zero-Day
Mozilla released Firefox 67.0.3 and Firefox ESR 60.7.1 to patch an actively exploited and critical severity vulnerability which could allow attackers to remotely execute arbitrary code on machines running vulnerable Firefox versions.
As Mozilla's security advisory says, the Firefox developers are "aware of targeted attacks in the wild abusing this flaw" which could allow attackers who exploit this vulnerability to take control of affected systems.
The Firefox and Firefox ESR zero-day flaw fixed by Mozilla was reported by Google Project Zero's Samuel Groß and the Coinbase Security team.
The type confusion vulnerability tracked as CVE-2019-11707occurs "when manipulating JavaScript objects due to issues in Array.pop."
Attackers could potentially trigger the type confusion by deceiving users of unpatched Firefox versions into visiting a maliciously crafted web page and, subsequently, executing arbitrary code on their systems.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) also issued an alert advising users "to review the Mozilla Security Advisory for Firefox 67.0.3 and Firefox ESR 60.7.1 and apply the necessary updates."
(Score: 2, Informative) by Anonymous Coward on Friday June 21 2019, @10:24AM
another zero day fix yesterday: https://www.bleepingcomputer.com/news/security/mozilla-firefox-6704-fixes-second-actively-exploited-zero-day/ [bleepingcomputer.com]