CVE-2019-11708

NameCVE-2019-11708
DescriptionInsufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1836-1, DSA-4471-1, DSA-4474-1
NVD severityhigh

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid94.0.2-1fixed
firefox-esr (PTS)stretch68.10.0esr-1~deb9u1fixed
stretch (security)78.15.0esr-1~deb9u1fixed
buster78.14.0esr-1~deb10u1fixed
buster (security)78.15.0esr-1~deb10u1fixed
bullseye78.14.0esr-1~deb11u1fixed
bullseye (security)78.15.0esr-1~deb11u1fixed
bookworm78.14.0esr-1fixed
sid91.3.0esr-2fixed
thunderbird (PTS)stretch1:68.10.0-1~deb9u1fixed
stretch (security)1:78.14.0-1~deb9u1fixed
buster, buster (security)1:78.14.0-1~deb10u1fixed
bullseye (security), bullseye1:78.14.0-1~deb11u1fixed
bookworm, sid1:91.3.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)67.0.4-1
firefox-esrsourcestretch60.7.2esr-1~deb9u1DSA-4474-1
firefox-esrsource(unstable)60.7.2esr-1
thunderbirdsourcejessie1:60.7.2-1~deb8u1DLA-1836-1
thunderbirdsourcestretch1:60.7.2-1~deb9u1DSA-4471-1
thunderbirdsource(unstable)1:60.7.2-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/#CVE-2019-11708
https://www.mozilla.org/en-US/security/advisories/mfsa2019-20/#CVE-2019-11708

Search for package or bug name: Reporting problems