Wednesday, November 20, 2024
HomeComputer SecurityFirefox 65.0 Released with Critical Security Fixes & Enhanced Protection for macOS,...

Firefox 65.0 Released with Critical Security Fixes & Enhanced Protection for macOS, Linux, and Android users

Published on

Firefox 65.0 released with the fixes of several security vulnerabilities along with various new futures including video streaming experience, updated language preference etc.

Firefox 65.0 improved its web compatibility and performance that supports
a web image format that brings the same image quality as existing formats at the smaller file size.

Also now its supports the new video compression technology called AV1 that brings better streaming experience for videos.

- Advertisement - SIEM as a Service

This new Firefox 65.0 version provides extremely enhanced tracking protection that helps to simplify with customized content blocking setting to control the online trackers.

According to Firefox, In terms of new changes, “Enhanced security for macOS, Linux, and Android users via stronger stack smashing protection which is now enabled by default for all platforms. “Stack smashing” is a common security attack in which malicious actors corrupt or take control of a vulnerable program.”

Along with various performance improvements in Firefox 65.0, it fixed the several security vulnerabilities that includes 3 “Critical” severity , “3 High” Severity and one modurate level vulnerabilities.

Firefox 65.0 Updates fixed Vulnerabilities

  1. CVE-2018-18500: Use-after-free parsing HTML5 stream – This vulnerability occurs when parsing an HTML5 stream in concert with custom HTML elements that exploitable crash the browser.
  2. CVE-2018-18502: Memory safety bugs fixed in Firefox 65 – This bug existing in the Firefox 64 that allow crashing the memory that could be exploited to run arbitrary code.
  3. CVE-2018-18501: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 – A memory corruption vulnerability that allows attacking run arbitrary code in Firefox 64 and Firefox ESR 60.4.
  4. CVE-2018-18503: Memory corruption with Audio Buffer-
    When JavaScript is used to create and manipulate an audio buffer, a potentially exploitable crash may occur because of a compartment mismatch in some situations.
  5. CVE-2018-18504: Memory corruption and out-of-bounds read of texture client buffer – potentially exploitable crash and the possibility of reading from the memory of the freed buffers.
  6. CVE-2018-18505: Privilege escalation through IPC channel messages – This bug allows sandbox escape through IPC channels due to lack of message validation in the listener process.
  7. CVE-2018-18506: Proxy Auto-Configuration file can define localhost access to be proxied – It allows for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing.

You can download the new updated Firefox Version 65.0 here.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

New Trickbot Malware Steal Password & Other Sensitive Data From Microsoft Outlook,Chrome,Firefox, IE, Edge

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Phobos Ransomware Admin as Part of International Hacking Operation

The U.S. Department of Justice unsealed criminal charges today against Evgenii Ptitsyn, a 42-year-old Russian...

Maxar Space Data Leak, Threat Actors Gain Unauthorized Access to the System

Maxar Space Systems, a leader in space technology and Earth intelligence solutions, has recently...

Apache Kafka Vulnerability Let Attackers Escalate Privileges

A newly identified vulnerability tracked as CVE-2024-31141, has been discovered in Apache Kafka Clients that could allow...

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Phobos Ransomware Admin as Part of International Hacking Operation

The U.S. Department of Justice unsealed criminal charges today against Evgenii Ptitsyn, a 42-year-old Russian...

Maxar Space Data Leak, Threat Actors Gain Unauthorized Access to the System

Maxar Space Systems, a leader in space technology and Earth intelligence solutions, has recently...

Apache Kafka Vulnerability Let Attackers Escalate Privileges

A newly identified vulnerability tracked as CVE-2024-31141, has been discovered in Apache Kafka Clients that could allow...