High-Impact Security Vulnerabilities in Firefox 128
Date: July 9, 2024
CVE: CVE-2024-6605 CVE-2024-6606 CVE-2024-6607 CVE-2024-6608 CVE-2024-6609 CVE-2024-6610 CVE-2024-6600 CVE-2024-6601 CVE-2024-6602 CVE-2024-6603 CVE-2024-6611 CVE-2024-6612 CVE-2024-6613 CVE-2024-6614 CVE-2024-6604 CVE-2024-6615
Vulnerability Type: Tapjacking
CWE: [[CWE-451]], [[CWE-922]]
Sources: Mozilla Security Advisory
Synopsis
Multiple security vulnerabilities were addressed in the latest Firefox 128 release, impacting both the desktop and Android versions. These vulnerabilities, if exploited, could lead to severe security breaches including tapjacking, out-of-bounds read, and memory corruption.
A list of all the CVEs mentioned in the Mozilla Foundation Security Advisory 2024-29:
- CVE-2024-6605: Firefox Android missed activation delay to prevent tapjacking (High)
- CVE-2024-6606: Out-of-bounds read in clipboard component (High)
- CVE-2024-6607: Leaving pointerlock by pressing the escape key could be prevented (Moderate)
- CVE-2024-6608: Cursor could be moved out of the viewport using pointerlock (Moderate)
- CVE-2024-6609: Memory corruption in NSS (Moderate)
- CVE-2024-6610: Form validation popups could block exiting full-screen mode (Moderate)
- CVE-2024-6600: Memory corruption in WebGL API (Moderate)
- CVE-2024-6601: Race condition in permission assignment (Moderate)
- CVE-2024-6602: Memory corruption in NSS (Moderate)
- CVE-2024-6603: Memory corruption in thread creation (Moderate)
- CVE-2024-6611: Incorrect handling of SameSite cookies (Low)
- CVE-2024-6612: CSP violation leakage when using devtools (Low)
- CVE-2024-6613: Incorrect listing of stack frames (Low)
- CVE-2024-6614: Incorrect listing of stack frames (Low)
- CVE-2024-6604: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (High)
- CVE-2024-6615: Memory safety bugs fixed in Firefox 128 (High)
Issue Summary
Mozilla announced fixes for several high-impact vulnerabilities in Firefox 128. Notably, CVE-2024-6606 which involves out-of-bounds read issues in the clipboard component, and CVE-2024-6609 related to memory corruption in the NSS library.
Technical Key Findings
CVE-2024-6605 allows attackers to overlay malicious prompts over legitimate permission dialogs, potentially tricking users into granting unwanted permissions. This vulnerability exploits the lack of a delay in activating permission prompts on Firefox Android, enabling immediate interactions which can be hijacked by malicious actors.
Vulnerable Products
- Firefox versions prior to 128
- Firefox ESR versions prior to 115.13
- Firefox Android versions prior to 128
Impact Assessment
If these vulnerabilities are exploited, attackers can perform actions such as reading out-of-bounds data, preventing users from exiting fullscreen mode, or executing arbitrary code. These can lead to unauthorized access to sensitive data, manipulation of browser behavior, and potential system compromises.
Patches or Workaround
Mozilla has released patches in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 to address these vulnerabilities. Users are advised to update to the latest versions to mitigate the risks associated with these security flaws.
Tags
#Firefox #CVE2024-6605 #Tapjacking #SecurityUpdate #Mozilla #Vulnerability #MemoryCorruption #OutOfBoundsRead