First published: Tue May 21 2019(Updated: )
A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <67 | 67 |
<67 | 67 | |
<60.7 | 60.7 | |
<60.7 | 60.7 | |
Mozilla Firefox | <67.0 | |
Mozilla Firefox ESR | <60.7 | |
Mozilla Thunderbird | <60.7 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-9818 is a vulnerability in the crash generation server used by Mozilla Firefox and Thunderbird, which can lead to a use-after-free in the main process and potentially allow an attacker to escape the sandbox.
CVE-2019-9818 only affects Windows users who are using Mozilla Firefox or Thunderbird versions up to 60.7.
CVE-2019-9818 has a severity rating of 8.3 (high).
To fix CVE-2019-9818, Windows users should update their Mozilla Firefox or Thunderbird installations to version 67.0 or higher.
More information about CVE-2019-9818 can be found on the Mozilla Bugzilla page (https://bugzilla.mozilla.org/show_bug.cgi?id=1542581) and the Mozilla security advisories (https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/).