Monday, January 27, 2025
HomeComputer SecurityFirefox 65.0 Released with Critical Security Fixes & Enhanced Protection for macOS,...

Firefox 65.0 Released with Critical Security Fixes & Enhanced Protection for macOS, Linux, and Android users

Published on

SIEM as a Service

Follow Us on Google News

Firefox 65.0 released with the fixes of several security vulnerabilities along with various new futures including video streaming experience, updated language preference etc.

Firefox 65.0 improved its web compatibility and performance that supports
a web image format that brings the same image quality as existing formats at the smaller file size.

Also now its supports the new video compression technology called AV1 that brings better streaming experience for videos.

This new Firefox 65.0 version provides extremely enhanced tracking protection that helps to simplify with customized content blocking setting to control the online trackers.

According to Firefox, In terms of new changes, “Enhanced security for macOS, Linux, and Android users via stronger stack smashing protection which is now enabled by default for all platforms. “Stack smashing” is a common security attack in which malicious actors corrupt or take control of a vulnerable program.”

Along with various performance improvements in Firefox 65.0, it fixed the several security vulnerabilities that includes 3 “Critical” severity , “3 High” Severity and one modurate level vulnerabilities.

Firefox 65.0 Updates fixed Vulnerabilities

  1. CVE-2018-18500: Use-after-free parsing HTML5 stream – This vulnerability occurs when parsing an HTML5 stream in concert with custom HTML elements that exploitable crash the browser.
  2. CVE-2018-18502: Memory safety bugs fixed in Firefox 65 – This bug existing in the Firefox 64 that allow crashing the memory that could be exploited to run arbitrary code.
  3. CVE-2018-18501: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 – A memory corruption vulnerability that allows attacking run arbitrary code in Firefox 64 and Firefox ESR 60.4.
  4. CVE-2018-18503: Memory corruption with Audio Buffer-
    When JavaScript is used to create and manipulate an audio buffer, a potentially exploitable crash may occur because of a compartment mismatch in some situations.
  5. CVE-2018-18504: Memory corruption and out-of-bounds read of texture client buffer – potentially exploitable crash and the possibility of reading from the memory of the freed buffers.
  6. CVE-2018-18505: Privilege escalation through IPC channel messages – This bug allows sandbox escape through IPC channels due to lack of message validation in the listener process.
  7. CVE-2018-18506: Proxy Auto-Configuration file can define localhost access to be proxied – It allows for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing.

You can download the new updated Firefox Version 65.0 here.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

New Trickbot Malware Steal Password & Other Sensitive Data From Microsoft Outlook,Chrome,Firefox, IE, Edge

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data

Researchers from IIT Kharagpur and Intel Corporation have identified a significant security vulnerability in...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...