CVE-2019-9811

As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1538007 Issue Tracking Permissions Required
https://bugzilla.mozilla.org/show_bug.cgi?id=1539598 Exploit Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1563327 Exploit Issue Tracking Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/08/msg00001.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/08/msg00002.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201908-12 Third Party Advisory
https://security.gentoo.org/glsa/201908-20 Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2019-21/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2019-22/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2019-23/ Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1538007 Issue Tracking Permissions Required
https://bugzilla.mozilla.org/show_bug.cgi?id=1539598 Exploit Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1563327 Exploit Issue Tracking Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/08/msg00001.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/08/msg00002.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201908-12 Third Party Advisory
https://security.gentoo.org/glsa/201908-20 Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2019-21/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2019-22/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2019-23/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-07-23 14:15

Updated : 2024-11-21 04:52


NVD link : CVE-2019-9811

Mitre link : CVE-2019-9811

CVE.ORG link : CVE-2019-9811


JSON object : View

Products Affected

debian

  • debian_linux

mozilla

  • thunderbird
  • firefox_esr
  • firefox

novell

  • suse_package_hub_for_suse_linux_enterprise

opensuse

  • leap
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')