-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2019.0269
       MFSA 2019-31 Security vulnerabilities fixed in Firefox 69.0.1
                             19 September 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              mozilla firefox
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Denial of Service              -- Remote with User Interaction
                      Provide Misleading Information -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2019-11754  
Member content until: Saturday, October 19 2019
Reference:            https://www.mozilla.org/en-US/security/advisories/mfsa2019-31/

OVERVIEW

        A security update for Mozilla Firefox has been released as version 
        69.0.1, addressing vulnerabilities rated by Mozilla as priority 
        "moderate". [1]


IMPACT

        Mozilla has provided the following information:
        
        "Mozilla Foundation Security Advisory 2019-31
        
        Security vulnerabilities fixed in Firefox 69.0.1
        
        Announced
            September 18, 2019
        Impact
            moderate
        Products
            Firefox
        Fixed in
               Firefox 69.0.1
        
        # CVE-2019-11754: Pointer Lock is enabled with no user notification
        
        Reporter
            Johann Hofmann
        Impact
            moderate
        
        Description
        
        When the pointer lock is enabled by a website though requestPointerLock() , no
        user notification is given. This could allow a malicious website to hijack the
        mouse pointer and confuse users.
        
        References
        
          o Bug 1580506" [1]


MITIGATION

        Mozilla advises updating to Firefox 69.0.1 to address this vulnerability. [1]


REFERENCES

        [1] MFSA 2019-31 Security vulnerabilities fixed in Firefox 69.0.1
            https://www.mozilla.org/en-US/security/advisories/mfsa2019-31/

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=yLN9
-----END PGP SIGNATURE-----