A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, and Thunderbird < 60.7.2.
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2019-20/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2019-18/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1544386 | issue tracking permissions required vendor advisory |
https://security.gentoo.org/glsa/201908-12 | third party advisory vendor advisory |