Mozilla Firefox Releases 62.0.3 & Security Updates for 2 High Critical Vulnerabilities

Mozilla Firefox Released security updates that cover 2 critical vulnerabilities in Firefox 62.0.3 and Firefox ESR 60.2.2.

One of the remote code execution vulnerability allows a remote attacker to get access to the system and both vulnerabilities are categorized under a critical impact.

Mozilla released Firefox 62.0.3 along with these 2 security patches and users can download the new version here.

Firefox’s automatic update system checks for updates frequently and if it finds a new update, installs it automatically. Firefox users who have blocked automatic updates need to run a manual check for updates here Select Menu > Help > About Firefox.

Vulnerabilities in Firefox 62.0.3

Type confusion in JavaScript: CVE-2018-12386

A Critical vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write.

This leads to remote code execution inside the sandboxed content process when triggered.

This vulnerability was reported by Niklas Baumstark, Samuel Groß, Bruno Keith via Beyond Security’s SecuriTeam.

Memory Address Leak Vulnerability: CVE-2018-12387

A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout.

This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process.

It was reported by Bruno Keith, Niklas Baumstark via Beyond Security’s SecuriTeam.

Related Read

Multiple Critical Vulnerabilities Fixed With Firefox 62 and Firefox ESR 60.2

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

2 hours ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

2 hours ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

2 hours ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

2 hours ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

2 hours ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

16 hours ago