"Mozilla Patches High-Severity Vulnerabilities in Firefox, Thunderbird"

Mozilla recently patched several high-severity vulnerabilities in its Firefox and Thunderbird products.  Firefox 104, as well as Firefox ESR 91.13 and 102.2, patches a high-severity address bar spoofing issue related to XSLT error handling.  The flaw, tracked as CVE-2022-38472, could be exploited for phishing.  The latest Firefox release also resolves CVE-2022-38473, an issue related to cross-origin XSLT documents that could pose security and privacy risks.  Another microphone-related issue patched in Firefox is CVE-2022-38474.  On Android, a website with permission to access the microphone could record audio without displaying a notification.  Since it does not actually allow an attacker to bypass the permission prompt, the flaw only has a severity rating of low.  Mozilla noted that two CVE identifiers, CVE-2022-38477 and CVE-2022-38478, have been assigned to multiple memory safety bugs that could lead to arbitrary code execution.  Most of these vulnerabilities have also been fixed in Thunderbird.  Mozilla said the flaws cannot be exploited through emails in Thunderbird because scripting is disabled, but noted that they represent “potential risks in browser or browser-like contexts”  The US Cybersecurity and Infrastructure Security Agency (CISA) has advised organizations to review Mozilla’s advisories and install the necessary patches.

 

SecurityWeek reports: "Mozilla Patches High-Severity Vulnerabilities in Firefox, Thunderbird"

Submitted by Anonymous on