CVE-2019-9802
CVSS V2 Medium 5
CVSS V3 High 7.5
Description
If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data. This vulnerability affects Firefox < 66.
Overview
- CVE ID
- CVE-2019-9802
- Assigner
- security@mozilla.org
- Vulnerability Status
- Analyzed
- Published Version
- 2019-04-26T17:29:03
- Last Modified Date
- 2021-07-21T11:39:23
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* | 1 | OR | 66.0 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:P/I:N/A:N
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- NONE
- Availability Impact
- NONE
- Base Score
- 5
- Severity
- MEDIUM
- Exploitability Score
- 10
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.0
- Vector String
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- NONE
- Base Score
- 7.5
- Base Severity
- HIGH
- Exploitability Score
- 3.9
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2019-07/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1415508 | Issue Tracking Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2019-9802 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9802 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 07:00:07 | Added to TrackCVE | |||
2022-12-03 20:09:31 | 2019-04-26T17:29Z | 2019-04-26T17:29:03 | CVE Published Date | updated |
2022-12-03 20:09:31 | 2021-07-21T11:39:23 | CVE Modified Date | updated | |
2022-12-03 20:09:31 | Analyzed | Vulnerability Status | updated |