During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1599008 | issue tracking exploit permissions required |
https://www.mozilla.org/security/advisories/mfsa2020-01/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2020-02/ | vendor advisory |
https://seclists.org/bugtraq/2020/Jan/18 | third party advisory mailing list |
http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html | third party advisory vdb entry exploit |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html | vendor advisory mailing list third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html | vendor advisory mailing list third party advisory |