Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.1208 Mozilla Foundation Security Advisory 2020-11 6 April 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Mozilla Firefox Mozilla Firefox Extended Support Release Publisher: Mozilla Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2020-6820 CVE-2020-6819 Original Bulletin: https://www.mozilla.org/en-US/security/advisories/mfsa2020-11/ Comment: Mozilla have advised that these vulnerabilites are being exploited in the wild via targeted attacks. - --------------------------BEGIN INCLUDED TEXT-------------------- Mozilla Foundation Security Advisory 2020-11 Security Vulnerabilities fixed in Firefox 74.0.1 and Firefox ESR 68.6.1 Announced April 3, 2020 Impact critical Products Firefox, Firefox ESR Fixed in Firefox 74.0.1 Firefox ESR 68.6.1 # CVE-2020-6819: Use-after-free while running the nsDocShell destructor Reporter Francisco Alonso @revskills working with Javier Marcos of @JMPSec Impact critical Description Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. References o Bug 1620818 # CVE-2020-6820: Use-after-free when handling a ReadableStream Reporter Francisco Alonso @revskills working with Javier Marcos of @JMPSec Impact critical Description Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. References o Bug 1626728 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXopzvmaOgq3Tt24GAQjsaBAAkrlcD4K5hPDZvJ6XFsXxiak8fRKIlmRx p3kENUD6VeeMul/slkx/Dx+qvoqJ26VLgkgPS4hjILPxekgAPaNzB3kplcaGIgaP LuBT5vO6ZvB60UCzb8ncaTcOf0MUcbrYVXtSwZqjgz5u2fXH0K9AkBgYoJmECbHg 5yy9ANe9We789WOga4TZL+Q/SnSkxLmxpH3gbzxa9nzbnf8o/o+00hyUuJ/n3P+O jmGuBDpaDKlyeyp6cQ9N/QuF4WKE1Ja0ElNPOXWNwgKxuKWNW8OhrtRsmt7rVMgH TptAXIRjofEEhyRWfQeHkBgVV/BY5RlZGf3+03ZSEdOLkJv7cS+zeus6sTVnzSqn Bul4NpGClut14d1kZWM+WLqt3IW7WjTCmgEdH1J/3HB6mewxR2ATGnva5QNJRqER 6TlfGTbru9Eb1+pt33tloAIHilQlN2bfmEVaouxyoKQEEtZ8Lud+EuPFSM8Kl3CR 8EfNVIoQoyhxZwdMmrHrbvA8hwGfv6NRaw77TWcLRTWsxFal8bcO+gj3o45s7bS7 UY1XmLx7fbBm3mpLvAGeMw/pTkWSn1cvm5LiL0gmTd29zOUfCTFdTNaOP9GLi8xu OLY3g7NP4DWeJnBToNewhWOFVMHrZnhPg9zFATFLbRqAsw+CKU5Q+lG5LsiTRdFK GwWyq2w9pqo= =Tdp5 -----END PGP SIGNATURE-----