Friday, March 29, 2024

Warning!! Firefox Fixes 2 Zero-Day Bugs That Exploited in Wide By Executing Arbitrary Code Remotely

Its time to update your Firefox Now!!

Mozilla released a security update with Firefox 74.0.1 & Firefox ESR 68.6.1 release and fixed 2 critical Zero-day vulnerabilities that actively exploited in wide as a targeted attack.

Both of the vulnerabilities are reported by Francisco Alonso and Javier Marcos, security researchers who have been worked together and reported it as Zero-day bugs.

https://twitter.com/revskills/status/1246141325680017415

These Critical remote code execution vulnerabilities are used as targeted attacks and actively exploited the systems that running Firefox 74.0.0 and earlier versions.

Attackers exploit these vulnerabilities and crash the Firefox running Windows, macOS and Linux operating systems.

Firefox 74.0.1

The first one is Use after free vulnerability (CVE-2020-6819) that allow the attacker to execute an arbitrary core remotely and crash the targeted system.

According to Firefox security update report “Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw.”

Second Vulnerability (CVE-2020-6820) can be exploited when Use-after-free handling a ReadableStream, and is exploited in wide as a targeted attack.

“Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw.”

Both vulnerabilities are targeting the race condition can cause a use-after-free that allows attackers to execute arbitrary code, depending on the privileges associated with the user an attacker could then install programs; view, change or delete data; or create new accounts with full user rights.

You can Download the new Firefox 74.0.1 from the following:

All the Firefox users apply the updates provided by Mozilla to vulnerable systems, immediately after appropriate testing, also users recommended not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.

Also Read: Firefox Brings DNS over HTTPS by Default for U.S Users: Here’s How to Enable It

Website

Latest articles

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles