Submitted via IRC for Bytram
Mozilla Firefox 67.0.3 Patches Actively Exploited Zero-Day
Mozilla released Firefox 67.0.3 and Firefox ESR 60.7.1 to patch an actively exploited and critical severity vulnerability which could allow attackers to remotely execute arbitrary code on machines running vulnerable Firefox versions.
As Mozilla's security advisory says, the Firefox developers are "aware of targeted attacks in the wild abusing this flaw" which could allow attackers who exploit this vulnerability to take control of affected systems.
The Firefox and Firefox ESR zero-day flaw fixed by Mozilla was reported by Google Project Zero's Samuel Groß and the Coinbase Security team.
The type confusion vulnerability tracked as CVE-2019-11707occurs "when manipulating JavaScript objects due to issues in Array.pop."
Attackers could potentially trigger the type confusion by deceiving users of unpatched Firefox versions into visiting a maliciously crafted web page and, subsequently, executing arbitrary code on their systems.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) also issued an alert advising users "to review the Mozilla Security Advisory for Firefox 67.0.3 and Firefox ESR 60.7.1 and apply the necessary updates."
(Score: 0) by Anonymous Coward on Friday June 21 2019, @11:48PM
They already have these for the 26 pin floppy cable (the pin version of the 26 pin Shugart edge connector?)
How hard would it be to engineer one for these nuclear systems? If you can't use USB/SD or capacitive memory, like flash, there is still FRAM, available in 8 pin SPI packages. 512K chips in a custom module that plugs into a rad-hardened floppy emulator seems perfect.
And I am pretty sure the STM32 has a rad hardened variant now too, doesn't it?
This is like money sitting on the table for someone talented enough to build it.