Security

Mozilla addresses High-Risk Firefox, Thunderbird vulnerabilities

Mozilla addressed18 security vulnerabilities affecting the popular Firefox web browser and the Thunderbird mail program.

Mozilla released Firefox 96 that addressed 18 security vulnerabilities in its web browser and the Thunderbird mail program. Nine vulnerabilities addressed by the new release are rated high-severity, the most severe one is a race condition issue tracked as CVE-2022-22746.

“A race condition could have allowed bypassing the fullscreen notification which could have lead to a fullscreen window spoof being unnoticed.” reads the advisory published by Mozilla.

The vulnerability only impacts Firefox for Windows operating systems.

An attacker can exploit the vulnerability to bypass the full-screen notification on Windows machines. Another important issue fixed by Mozilla is a fullscreen spoof in the Firefox browser window tracked as CVE-2022-22743. The vulnerability can allow an attacker-controlled tab to prevent the browser from leaving fullscreen mode when the user navigates from inside an iframe.

Another issue fixed by the organization is a bug that prevents a popup window from leaving fullscreen mode when resizing the popup while setting fullscreen mode.

Another issue fixed by Mozilla is an out-of-bounds memory access leading to a potentially exploitable crash, the flaw has been tracked as CVE-2022-22742.

“When inserting text while in edit mode, some characters might have lead to out-of-bounds memory access causing a potentially exploitable crash.” continues the advisory. 

The above vulnerabilities were discovered by the researchers Irvan Kurniawan.

Firefox 96 also addressed a heap-buffer overflow tracked as CVE-2022-22738. Applying a CSS filter effect could have accessed out-of-bounds memory, which could lead to a heap-buffer-overflow causing a potentially exploitable crash.

Other high-risk flaws fixed with the latest Firefox release include two use-after-free flaws, tracked as CVE-2022-22740 and CVE-2022-22737 respectively, and an iframe sandbox bypass using XSLT tracked as CVE-2021-4140.

The organization fixed six medium severity in issue in Firefox, including a sandbox escape and the lack of URL restrictions when scanning QR codes in Firefox for Android.

The open-source organization also fixed a series of memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 and Thunderbird 91.5 (CVE-2022-22751).

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Mozilla)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Operation RapTor led to the arrest of 270 dark web vendors and buyers

Law enforcement operation codenamed 'Operation RapTor' led to the arrest of 270 dark web vendors…

10 hours ago

Chinese threat actors exploited Trimble Cityworks flaw to breach U.S. local government networks

A Chinese threat actor, tracked as UAT-6382, exploited a patched Trimble Cityworks flaw to deploy…

13 hours ago

U.S. CISA adds a Samsung MagicINFO 9 Server flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Samsung MagicINFO 9 Server vulnerability to its…

21 hours ago

New Signal update stops Windows from capturing user chats

Signal implements new screen security on Windows 11, blocking screenshots by default to protect user…

1 day ago

Law enforcement dismantled the infrastructure behind Lumma Stealer MaaS

Microsoft found 394,000 Windows systems talking to Lumma stealer controllers, a victim pool that included…

1 day ago

Russia-linked APT28 targets western logistics entities and technology firms

CISA warns Russia-linked group APT28 is targeting Western logistics and tech firms aiding Ukraine, posing…

2 days ago