First published: Tue May 21 2019(Updated: )
A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with `UnboxedObjects`, which are disabled by default on all supported releases.* External Reference: <a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-9816">https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-9816</a>
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <60.7 | 60.7 |
Mozilla Firefox ESR | <60.7 | 60.7 |
Mozilla Firefox | <67 | 67 |
Mozilla Firefox | <67.0 | |
Mozilla Firefox ESR | <60.7 | |
Mozilla Thunderbird | <60.7 | |
debian/firefox | 133.0.3-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.5.0esr-1~deb11u1 128.3.1esr-1~deb12u1 128.5.0esr-1~deb12u1 128.5.0esr-1 128.5.1esr-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.5.0esr-1~deb11u1 1:115.16.0esr-1~deb12u1 1:128.5.0esr-1~deb12u1 1:128.5.2esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2019-9816.
The severity of CVE-2019-9816 is high.
The affected software is Mozilla Firefox and Mozilla Thunderbird.
To fix CVE-2019-9816, update Mozilla Firefox and Mozilla Thunderbird to version 67.0+ or higher.
You can find more information about CVE-2019-9816 at the following references: [Reference 1](https://bugzilla.mozilla.org/show_bug.cgi?id=1536768), [Reference 2](https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/), [Reference 3](https://www.mozilla.org/security/advisories/mfsa2019-13/).