First published: Tue Oct 03 2023(Updated: )
Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. (CVE-2023-5169, CVE-2023-5170, CVE-2023-5171, CVE-2023-5172, CVE-2023-5175, CVE-2023-5176) Ronald Crane discovered that Firefox did not properly manage memory when non-HTTPS Alternate Services (network.http.altsvc.oe) is enabled. An attacker could potentially exploit this issue to cause a denial of service. (CVE-2023-5173) Clément Lecigne discovered that Firefox did not properly manage memory when handling VP8 media stream. An attacker-controlled VP8 media stream could lead to a heap buffer overflow in the content process, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-5217)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/firefox | <118.0.1+build1-0ubuntu0.20.04.1 | 118.0.1+build1-0ubuntu0.20.04.1 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6404-1 is not specified.
An attacker can exploit USN-6404-1 by tricking a user into opening a specially crafted website.
If an attacker exploits USN-6404-1, they can potentially cause a denial of service, obtain sensitive information across domains, or execute arbitrary code.
The recommended remedy for USN-6404-1 is to update Firefox to version 118.0.1+build1-0ubuntu0.20.04.1.
You can find more information about USN-6404-1 at the following reference links: [Link 1](https://ubuntu.com/security/CVE-2023-5175), [Link 2](https://ubuntu.com/security/CVE-2023-5173), [Link 3](https://ubuntu.com/security/CVE-2023-5170).