Submitted via IRC for Bytram
Mozilla Firefox 67.0.3 Patches Actively Exploited Zero-Day
Mozilla released Firefox 67.0.3 and Firefox ESR 60.7.1 to patch an actively exploited and critical severity vulnerability which could allow attackers to remotely execute arbitrary code on machines running vulnerable Firefox versions.
As Mozilla's security advisory says, the Firefox developers are "aware of targeted attacks in the wild abusing this flaw" which could allow attackers who exploit this vulnerability to take control of affected systems.
The Firefox and Firefox ESR zero-day flaw fixed by Mozilla was reported by Google Project Zero's Samuel Groß and the Coinbase Security team.
The type confusion vulnerability tracked as CVE-2019-11707occurs "when manipulating JavaScript objects due to issues in Array.pop."
Attackers could potentially trigger the type confusion by deceiving users of unpatched Firefox versions into visiting a maliciously crafted web page and, subsequently, executing arbitrary code on their systems.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) also issued an alert advising users "to review the Mozilla Security Advisory for Firefox 67.0.3 and Firefox ESR 60.7.1 and apply the necessary updates."
(Score: 2) by tangomargarine on Friday June 21 2019, @03:16PM (1 child)
As a term it's dumb because people feel the need to constantly use it to more precisely identify the type of bug, but by default pretty much all bugs are zero-days unless the company knows about the bug and doesn't bother to fix it. We should instead have a specialized term for that and just call "it's a bug the company doesn't know about yet" bugs.
"Is that really true?" "I just spent the last hour telling you to think for yourself! Didn't you hear anything I said?"
(Score: 4, Funny) by Anonymous Coward on Friday June 21 2019, @04:09PM
A zero-day is a bug that doesn't have a website, logo, or theme song yet?