Firefox Remote Code Execution Vulnerability

TACTICAL CYBER INTELLIGENCE REPORT

Actor Type: II
Serial: TR-18-033-002
Countries: IN, CN
Report Date: 20180201

Firefox Remote Code Execution Vulnerability

Mozilla has released a critical update to patch a serious vulnerability that allows attackers to execute code remotely on computers running the affected version of Firefox browser.

The vulnerability, dubbed CVE-2018-5124 [1], is the result of insufficient sanitization of HTML fragments in chrome-privileged documents by the affected software. An attacker could exploit the vulnerability by persuading a user to access a link or file that submits malicious input to the Firefox. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the user. If the user has elevated privileges, the attacker could compromise the system completely [2].

Affected Versions

Affected web browser versions include Firefox 56 (.0, .0.1, .0.2), 57 (.0, .0.1, .0.2, .0.3, .0.4), and 58 (.0). To check your Firefox version.  
Go to Menu - > Help -> About Firefox

Mitigation and Prevention Strategies

The vulnerability has been addressed in Firefox 58.0.1. and users are advised to update their browsers as soon as possible.  Also, users should not click malicious links and URLs.  Administrators are advised to use an unprivileged account when browsing the Internet and monitor critical systems.

 

[1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5124

[2] https://tools.cisco.com/security/center/viewAlert.x?alertId=56610

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!