The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2020-16/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2020-17/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1618911 | issue tracking vendor advisory |
http://packetstormsecurity.com/files/157860/Firefox-Default-Content-Process-DACL-Sandbox-Escape.html | vdb entry third party advisory |