First published: Tue Mar 19 2019(Updated: )
A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. Note: This issue only affects Windows operating systems. Other operating systems are unaffected.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <66 | 66 |
Thunderbird | <60.6 | 60.6 |
Firefox ESR | <60.6 | 60.6 |
All of | ||
Any of | ||
Firefox | <66.0 | |
Firefox ESR | <60.6.0 | |
Thunderbird | <60.6.0 | |
Microsoft Windows Operating System | ||
Firefox | <66.0 | |
Firefox ESR | <60.6.0 | |
Thunderbird | <60.6.0 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this vulnerability is CVE-2019-9794.
The severity level of CVE-2019-9794 is critical.
The software products affected by CVE-2019-9794 are Mozilla Firefox (version up to exclusive 66), Mozilla Thunderbird (version up to exclusive 60.6), and Mozilla Firefox ESR (version up to exclusive 60.6).
CVE-2019-9794 can be exploited by using specific command line arguments during Firefox invocation as a shell handler for URLs to retrieve and execute files.
No, Microsoft Windows systems are not vulnerable to CVE-2019-9794.