Advertisement
Guest User

Untitled

a guest
May 23rd, 2019
112
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.61 KB | None | 0 0
  1. entially risks in browser or browser-like contexts.
  2. #CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS
  3.  
  4. Reporter
  5. Multiple independent researchers
  6. Impact
  7. high
  8.  
  9. Description
  10.  
  11. If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thread and any worker threads.
  12. Note: users need to update to macOS 10.14.5 in order to take advantage of this change.
  13. References
  14.  
  15. Bug 1546544
  16. RIDL and Fallout: MDS attacks
  17.  
  18. #CVE-2019-9816: Type confusion with object groups and UnboxedObjects
  19.  
  20. Reporter
  21. Samuel Groß of Google Project Zero
  22. Impact
  23. high
  24.  
  25. Description
  26.  
  27. A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups.
  28. Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases.
  29. References
  30.  
  31. Bug 1536768
  32.  
  33. #CVE-2019-9817: Stealing of cross-domain images using canvas
  34.  
  35. Reporter
  36. Luật Nguyễn
  37. Impact
  38. high
  39.  
  40. Description
  41.  
  42. Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy.
  43. References
  44.  
  45. Bug 1540221
  46.  
  47. #CVE-2019-9818: Use-after-free in crash generation server
  48.  
  49. Reporter
  50. Thomas Imbert
  51. Impact
  52. high
  53.  
  54. Description
  55.  
  56. A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape.
  57. Note: this vulnerability only affects Windows. Other operating systems are unaffected.
  58. References
  59.  
  60. Bug 1542581
  61.  
  62. #CVE-2019-9819: Compartment mismatch with fetch API
  63.  
  64. Reporter
  65. Nils
  66. Impact
  67. high
  68.  
  69. Description
  70.  
  71. A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash.
  72. References
  73.  
  74. Bug 1532553
  75.  
  76. #CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell
  77.  
  78. Reporter
  79. Nils
  80. Impact
  81. high
  82.  
  83. Description
  84.  
  85. A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash.
  86. References
  87.  
  88. Bug 1536405
  89.  
  90. #CVE-2019-11691: Use-after-free in XMLHttpRequest
  91.  
  92. Reporter
  93. Nils
  94. Impact
  95. high
  96.  
  97. Description
  98.  
  99. A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash.
  100. References
  101.  
  102. Bug 1542465
  103.  
  104. #CVE-2019-11692: Use-after-free removing listeners in the event listener manager
  105.  
  106. Reporter
  107. Nils
  108. Impact
  109. high
  110.  
  111. Description
  112.  
  113. A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash.
  114. References
  115.  
  116. Bug 1544670
  117.  
  118. #CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux
  119.  
  120. Reporter
  121. crixer
  122. Impact
  123. high
  124.  
  125. Description
  126.  
  127. The bufferdata function in WebGL is vulnerable to a buffer overflow with specific graphics drivers on Linux. This could result in malicious content freezing a tab or triggering a potentially exploitable crash.
  128. Note: this issue only occurs on Linux. Other operating systems are unaffected.
  129. References
  130.  
  131. Bug 1532525
  132.  
  133. #CVE-2019-7317: Use-after-free in png_image_free of libpng library
  134.  
  135. Reporter
  136. OSS-Fuzz, Eddie Lee
  137. Impact
  138. high
  139.  
  140. Description
  141.  
  142. A use-after-free vulnerability was discovered in the png_image_free function in the libpng library. This could lead to denial of service or a potentially exploitable crash when a malformed image is processed.
  143. References
  144.  
  145. Bug 1542829
  146.  
  147. #CVE-2019-9797: Cross-origin theft of images with createImageBitmap
  148.  
  149. Reporter
  150. AaylaSecura1138
  151. Impact
  152. high
  153.  
  154. Description
  155.  
  156. Cross-origin images can be read in violation of the same-origin policy by exporting an image after using createImageBitmap to read the image and then rendering the resulting bitmap image within a canvas element.
  157. References
  158.  
  159. Bug 1528909
  160.  
  161. #CVE-2018-18511: Cross-origin theft of images with ImageBitmapRenderingContext
  162.  
  163. Reporter
  164. AaylaSecura1138
  165. Impact
  166. high
  167.  
  168. Description
  169.  
  170. Cross-origin images can be read from a canvas element in violation of the same-origin policy using the transferFromImageBitmap method.
  171. References
  172.  
  173. Bug 1526218
  174.  
  175. #CVE-2019-11694: Uninitialized memory memory leakage in Windows sandbox
  176.  
  177. Reporter
  178. Jeremy Fetiveau of SSD Secure Disclosure
  179. Impact
  180. moderate
  181.  
  182. Description
  183.  
  184. A vulnerability exists in the Windows sandbox where an uninitialized value in memory can be leaked to a renderer from a broker when making a call to access an otherwise unavailable file. This results in the potential leaking of information stored at that memory location.
  185. Note: this issue only occurs on Windows. Other operating systems are unaffected.
  186. References
  187.  
  188. Bug 1534196
  189.  
  190. #CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks
  191.  
  192. Reporter
  193. Abdulrahman Alqabandi
  194. Impact
  195. moderate
  196.  
  197. Description
  198.  
  199. If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site.
  200. References
  201.  
  202. Bug 1543191
  203.  
  204. #CVE-2019-5798: Out-of-bounds read in Skia
  205.  
  206. Reporter
  207. Tran Tien Hung of Viettel Cyber Security
  208. Impact
  209. moderate
  210.  
  211. Description
  212.  
  213. An out-of-bounds read can occur in the Skia library during path transformations. This could result in the exposure of data stored in memory.
  214. References
  215.  
  216. Bug 1535518
  217.  
  218. #CVE-2019-9800: Memory safety bugs fixed in Firefox 67, Firefox ESR 60.7, and Thunderbird 60.7
  219.  
  220. Reporter
  221. Mozilla developers and community
  222. Impact
  223. critical
  224.  
  225. Description
  226.  
  227. Mozilla developers and community members Olli Pettay, Bogdan Tara, Jan de Mooij, Jason Kratzer, Jan Varga, Gary Kwong, Tim Guan-tin Chien, Tyson Smith, Ronald Crane, and Ted Campbell reported memory safety bugs present in Firefox 66, Firefox ESR 60.6, and Thunderbird 60.6. Some of these
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement