Mozilla Patches Firefox Zero-Day Exploited in Targeted Attacks:
Updates released by Mozilla on Wednesday for its Firefox browser address a zero-day vulnerability that has been exploited in targeted attacks.
The vulnerability, tracked as CVE-2019-17026 and classified as having critical impact, has been described by Mozilla as an "IonMonkey type confusion with StoreElementHole and FallibleStoreElement." IonMonkey is the Just-in-Time (JIT) compiler for Firefox's SpiderMonkey JavaScript engine.
"Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion," Mozilla explained in its advisory.
Mozilla says it's aware of targeted attacks exploiting this zero-day, but no other information has been made available.
A Current Activity bulletin released by the U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) says the vulnerability could allow an attacker to take control of an affected system.
The flaw has been patched with the release of Firefox 72.0.1 and Firefox ESR 68.4.1, and users have been advised to update their installations.
Also at Ars Technica
(Score: 0) by Anonymous Coward on Sunday January 12 2020, @10:50PM
Don't like newer firefox browsers.
The de-populated tool bar, lost buttons to disable/enable javascript and cookies has me wanting older firefox browsers. Ninety-nine percent of the time I browse with javascript and cookies disabled. The Internet is a much more pleasant and safer place that way.
IMO, providing a quick method (other than about:config) to disable javascript is a valuable security feature.
The whole "treating users as idiots" thing is too Microsofty for me.