CVE-2019-11708

NameCVE-2019-11708
DescriptionInsufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1836-1, DSA-4471-1, DSA-4474-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid133.0-1fixed
firefox-esr (PTS)bullseye115.14.0esr-1~deb11u1fixed
bullseye (security)128.5.0esr-1~deb11u1fixed
bookworm128.3.1esr-1~deb12u1fixed
bookworm (security)128.5.0esr-1~deb12u1fixed
sid, trixie128.5.0esr-1fixed
thunderbird (PTS)bullseye1:115.12.0-1~deb11u1fixed
bullseye (security)1:128.5.0esr-1~deb11u1fixed
bookworm1:115.16.0esr-1~deb12u1fixed
bookworm (security)1:128.5.0esr-1~deb12u1fixed
sid, trixie1:128.5.0esr-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)67.0.4-1
firefox-esrsourcestretch60.7.2esr-1~deb9u1DSA-4474-1
firefox-esrsource(unstable)60.7.2esr-1
thunderbirdsourcejessie1:60.7.2-1~deb8u1DLA-1836-1
thunderbirdsourcestretch1:60.7.2-1~deb9u1DSA-4471-1
thunderbirdsource(unstable)1:60.7.2-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/#CVE-2019-11708
https://www.mozilla.org/en-US/security/advisories/mfsa2019-20/#CVE-2019-11708

Search for package or bug name: Reporting problems