First published: Tue Jul 09 2019(Updated: )
As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <68 | 68 |
Mozilla Firefox ESR | <60.8 | 60.8 |
Mozilla Thunderbird | <60.8 | 60.8 |
Mozilla Firefox | <68.0 | |
Mozilla Firefox ESR | <60.8 | |
Mozilla Thunderbird | <60.8 | |
Debian Debian Linux | =8.0 | |
Novell Suse Package Hub For Suse Linux Enterprise | =12 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-9811 is a vulnerability that allows a sandbox escape in Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
This vulnerability can be exploited by installing a malicious language pack and then opening a browser feature that uses the compromised translation.
Firefox ESR versions prior to 60.8, Firefox versions prior to 68, and Thunderbird versions prior to 60.8 are affected.
CVE-2019-9811 has a severity rating of 8.3 (high).
Yes, updating to Firefox ESR 60.8 or later, Firefox 68 or later, or Thunderbird 60.8 or later will fix the vulnerability.