CVE-2019-11691Use After Free in Mozilla Firefox

CWE-416Use After Free15 documents8 sources
Severity
9.8CRITICALNVD
EPSS
0.5%
top 33.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 23
Latest updateMay 24

Description

A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages12 packages

debiandebian/firefox< firefox 67.0-2 (sid)
CVEListV5mozilla/firefoxunspecified67
NVDmozilla/firefox< 67.0
debiandebian/firefox-esr< firefox 67.0-2 (sid)
CVEListV5mozilla/firefox_esrunspecified60.7

🔴Vulnerability Details

6
GHSA
GHSA-85v3-g6vp-hq6p: A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it ha2022-05-24
OSV
CVE-2019-11691: A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it ha2019-07-23
OSV
firefox regression2019-06-14
OSV
firefox regression2019-06-06
OSV
thunderbird vulnerabilities2019-05-28

📋Vendor Advisories

6
Ubuntu
Firefox regression2019-06-14
Ubuntu
Firefox regression2019-06-06
Ubuntu
Thunderbird vulnerabilities2019-05-28
Red Hat
Mozilla: Use-after-free in XMLHttpRequest2019-05-22
Ubuntu
Firefox vulnerabilities2019-05-21

📄Research Papers

1
arXiv
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-642022-03-08

💬Community

1
Bugzilla
CVE-2019-11691 Mozilla: Use-after-free in XMLHttpRequest2019-05-22