Thursday, October 10, 2024
HomeComputer SecurityFirefox 65.0 Released with Critical Security Fixes & Enhanced Protection for macOS,...

Firefox 65.0 Released with Critical Security Fixes & Enhanced Protection for macOS, Linux, and Android users

Published on

Firefox 65.0 released with the fixes of several security vulnerabilities along with various new futures including video streaming experience, updated language preference etc.

Firefox 65.0 improved its web compatibility and performance that supports
a web image format that brings the same image quality as existing formats at the smaller file size.

Also now its supports the new video compression technology called AV1 that brings better streaming experience for videos.

- Advertisement - EHA

This new Firefox 65.0 version provides extremely enhanced tracking protection that helps to simplify with customized content blocking setting to control the online trackers.

According to Firefox, In terms of new changes, “Enhanced security for macOS, Linux, and Android users via stronger stack smashing protection which is now enabled by default for all platforms. “Stack smashing” is a common security attack in which malicious actors corrupt or take control of a vulnerable program.”

Along with various performance improvements in Firefox 65.0, it fixed the several security vulnerabilities that includes 3 “Critical” severity , “3 High” Severity and one modurate level vulnerabilities.

Firefox 65.0 Updates fixed Vulnerabilities

  1. CVE-2018-18500: Use-after-free parsing HTML5 stream – This vulnerability occurs when parsing an HTML5 stream in concert with custom HTML elements that exploitable crash the browser.
  2. CVE-2018-18502: Memory safety bugs fixed in Firefox 65 – This bug existing in the Firefox 64 that allow crashing the memory that could be exploited to run arbitrary code.
  3. CVE-2018-18501: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 – A memory corruption vulnerability that allows attacking run arbitrary code in Firefox 64 and Firefox ESR 60.4.
  4. CVE-2018-18503: Memory corruption with Audio Buffer-
    When JavaScript is used to create and manipulate an audio buffer, a potentially exploitable crash may occur because of a compartment mismatch in some situations.
  5. CVE-2018-18504: Memory corruption and out-of-bounds read of texture client buffer – potentially exploitable crash and the possibility of reading from the memory of the freed buffers.
  6. CVE-2018-18505: Privilege escalation through IPC channel messages – This bug allows sandbox escape through IPC channels due to lack of message validation in the listener process.
  7. CVE-2018-18506: Proxy Auto-Configuration file can define localhost access to be proxied – It allows for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing.

You can download the new updated Firefox Version 65.0 here.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

New Trickbot Malware Steal Password & Other Sensitive Data From Microsoft Outlook,Chrome,Firefox, IE, Edge

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability...

Wireshark 4.4.1 Released, What’s new!

Wireshark, the world’s leading network protocol analyzer, has just released version 4.4.1, bringing a...