First published: Tue Mar 19 2019(Updated: )
A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. Note: This issue only affects Windows operating systems. Other operating systems are unaffected.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <60.6 | 60.6 |
Mozilla Firefox ESR | <60.6 | 60.6 |
Mozilla Firefox | <66 | 66 |
Mozilla Firefox | <66.0 | |
Mozilla Firefox ESR | <60.6.0 | |
Mozilla Thunderbird | <60.6.0 | |
Microsoft Windows | ||
All of | ||
Any of | ||
Mozilla Firefox | <66.0 | |
Mozilla Firefox ESR | <60.6.0 | |
Mozilla Thunderbird | <60.6.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this vulnerability is CVE-2019-9794.
The severity level of CVE-2019-9794 is critical.
The software products affected by CVE-2019-9794 are Mozilla Firefox (version up to exclusive 66), Mozilla Thunderbird (version up to exclusive 60.6), and Mozilla Firefox ESR (version up to exclusive 60.6).
CVE-2019-9794 can be exploited by using specific command line arguments during Firefox invocation as a shell handler for URLs to retrieve and execute files.
No, Microsoft Windows systems are not vulnerable to CVE-2019-9794.