Saturday, December 2, 2023

Firefox 65.0 Released with Critical Security Fixes & Enhanced Protection for macOS, Linux, and Android users

Firefox 65.0 released with the fixes of several security vulnerabilities along with various new futures including video streaming experience, updated language preference etc.

Firefox 65.0 improved its web compatibility and performance that supports
a web image format that brings the same image quality as existing formats at the smaller file size.

Also now its supports the new video compression technology called AV1 that brings better streaming experience for videos.

This new Firefox 65.0 version provides extremely enhanced tracking protection that helps to simplify with customized content blocking setting to control the online trackers.

According to Firefox, In terms of new changes, “Enhanced security for macOS, Linux, and Android users via stronger stack smashing protection which is now enabled by default for all platforms. “Stack smashing” is a common security attack in which malicious actors corrupt or take control of a vulnerable program.”

Along with various performance improvements in Firefox 65.0, it fixed the several security vulnerabilities that includes 3 “Critical” severity , “3 High” Severity and one modurate level vulnerabilities.

Firefox 65.0 Updates fixed Vulnerabilities

  1. CVE-2018-18500: Use-after-free parsing HTML5 stream – This vulnerability occurs when parsing an HTML5 stream in concert with custom HTML elements that exploitable crash the browser.
  2. CVE-2018-18502: Memory safety bugs fixed in Firefox 65 – This bug existing in the Firefox 64 that allow crashing the memory that could be exploited to run arbitrary code.
  3. CVE-2018-18501: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 – A memory corruption vulnerability that allows attacking run arbitrary code in Firefox 64 and Firefox ESR 60.4.
  4. CVE-2018-18503: Memory corruption with Audio Buffer-
    When JavaScript is used to create and manipulate an audio buffer, a potentially exploitable crash may occur because of a compartment mismatch in some situations.
  5. CVE-2018-18504: Memory corruption and out-of-bounds read of texture client buffer – potentially exploitable crash and the possibility of reading from the memory of the freed buffers.
  6. CVE-2018-18505: Privilege escalation through IPC channel messages – This bug allows sandbox escape through IPC channels due to lack of message validation in the listener process.
  7. CVE-2018-18506: Proxy Auto-Configuration file can define localhost access to be proxied – It allows for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing.

You can download the new updated Firefox Version 65.0 here.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

New Trickbot Malware Steal Password & Other Sensitive Data From Microsoft Outlook,Chrome,Firefox, IE, Edge


Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles