The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/157860/Firefox-Default-Content-Process-DACL-Sandbox-Escape.html | Third Party Advisory VDB Entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=1618911 | Issue Tracking Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2020-16/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2020-17/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mozilla
Published: 2020-05-26T17:04:19
Updated: 2020-05-28T17:06:16
Reserved: 2020-04-28T00:00:00
Link: CVE-2020-12388
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-05-26T18:15:11.077
Modified: 2023-02-28T15:18:43.697
Link: CVE-2020-12388
JSON object: View
Redhat Information
No data.
CWE