-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2019.0252
         Multiple vulnerabilities have been identified in Mozilla
                          Firefox and Firefox ESR
                             4 September 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Mozilla Firefox
                      Mozilla Firefox ESR
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Increased Privileges            -- Existing Account            
                      Access Privileged Data          -- Remote with User Interaction
                      Modify Arbitrary Files          -- Existing Account            
                      Cross-site Scripting            -- Remote with User Interaction
                      Denial of Service               -- Remote with User Interaction
                      Access Confidential Data        -- Remote/Unauthenticated      
                      Reduced Security                -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2019-11753 CVE-2019-11752 CVE-2019-11751
                      CVE-2019-11750 CVE-2019-11749 CVE-2019-11748
                      CVE-2019-11747 CVE-2019-11746 CVE-2019-11744
                      CVE-2019-11743 CVE-2019-11742 CVE-2019-11741
                      CVE-2019-11740 CVE-2019-11738 CVE-2019-11737
                      CVE-2019-11736 CVE-2019-11735 CVE-2019-11734
                      CVE-2019-9812 CVE-2019-5849 
Member content until: Friday, October  4 2019
Reference:            ESB-2019.3085

OVERVIEW

        Multiple vulnerabilities have been identified in Mozilla Firefox 
        versions prior to 69, Firefox ESR versions prior to 68.1 and 60.9. 
        [1-3]


IMPACT

        The vendor has provided the following details regarding the 
        vulnerabilities:
        
        " CVE-2019-11751: Malicious code execution through command line 
        parameters
        
        Reporter Ping Fan (Zetta) Ke of VXRL working with iDefense Labs 
        Impact critical
        
        Description
        
        Logging-related command line parameters are not properly sanitized 
        when Firefox is launched by another program, such as when a user 
        clicks on malicious links in a chat application. This can be used to
        write a log file to an arbitrary location such as the Windows 
        'Startup' folder. Note: this issue only affects Firefox on Windows 
        operating systems.
        
        References
        
          o Bug 1572838
        
        # CVE-2019-11746: Use-after-free while manipulating video
        
        Reporter Nils Impact high
        
        Description
        
        A use-after-free vulnerability can occur while manipulating video 
        elements if the body is freed while still in use. This results in a
        potentially exploitable crash.
        
        References
        
          o Bug 1564449
        
        # CVE-2019-11744: XSS by breaking out of title and textarea elements
        using innerHTML
        
        Reporter Rakesh Mane Impact high
        
        Description
        
        Some HTML elements, such as <title> and <textarea> , can contain 
        literal angle brackets without treating them as markup. It is 
        possible to pass a literal closing tag to .innerHTML on these 
        elements, and subsequent content after that will be parsed as if it
        were outside the tag. This can lead to XSS if a site does not filter
        user input as strictly for these elements as it does for other 
        elements.
        
        References
        
          o Bug 1562033
        
        # CVE-2019-11742: Same-origin policy violation with SVG filters and
        canvas to steal cross-origin images
        
        Reporter Paul Stone Impact high
        
        Description
        
        A same-origin policy violation occurs allowing the theft of 
        cross-origin images through a combination of SVG filters and a 
        <canvas> element due to an error in how same-origin policy is 
        applied to cached image content. The resulting same-origin policy 
        violation could allow for data theft.
        
        References
        
          o Bug 1559715
        
        # CVE-2019-11736: File manipulation and privilege escalation in 
        Mozilla Maintenance Service
        
        Reporter Seb Patane Impact high
        
        Description
        
        The Mozilla Maintenance Service does not guard against files being 
        hardlinked to another file in the updates directory, allowing for 
        the replacement of local files, including the Maintenance Service 
        executable, which is run with privileged access. Additionally, there
        was a race condition during checks for junctions and symbolic links
        by the Maintenance Service, allowing for potential local file and 
        directory manipulation to be undetected in some circumstances. This
        allows for potential privilege escalation by a user with 
        unprivileged local access. Note: These attacks requires local system
        access and only affects Windows. Other operating systems are not 
        affected.
        
        References
        
          o Bug 1551913 o Bug 1552206
        
        # CVE-2019-11753: Privilege escalation with Mozilla Maintenance 
        Service in custom Firefox installation location
        
        Reporter Holger Fuhrmannek Impact high
        
        Description
        
        The Firefox installer allows Firefox to be installed to a custom 
        user writable location, leaving it unprotected from manipulation by
        unprivileged users or malware. If the Mozilla Maintenance Service is
        manipulated to update this unprotected location and the updated 
        maintenance service in the unprotected location has been altered, 
        the altered maintenance service can run with elevated privileges 
        during the update process due to a lack of integrity checks. This 
        allows for privilege escalation if the executable has been replaced
        locally. Note: This attack requires local system access and only 
        affects Windows. Other operating systems are not affected.
        
        References
        
          o Bug 1574980
        
        # CVE-2019-11752: Use-after-free while extracting a key value in 
        IndexedDB
        
        Reporter Zhanjia Song Impact high
        
        Description
        
        It is possible to delete an IndexedDB key value and subsequently try
        to extract it during conversion. This results in a use-after-free 
        and a potentially exploitable crash.
        
        References
        
          o Bug 1501152
        
        # CVE-2019-9812: Sandbox escape through Firefox Sync
        
        Reporter Niklas Baumstark via TrendMicro's Zero Day Initiative 
        Impact high
        
        Description
        
        Given a compromised sandboxed content process due to a separate 
        vulnerability, it is possible to escape that sandbox by loading 
        accounts.firefox.com in that process and forcing a log-in to a 
        malicious Firefox Sync account. Preference settings that disable the
        sandbox are then synchronized to the local machine and the 
        compromised browser would restart without the sandbox if a crash is
        triggered.
        
        References
        
          o Bug 1538008 o Bug 1538015
        
        # CVE-2019-11741: Isolate addons.mozilla.org and 
        accounts.firefox.com
        
        Reporter Niklas Baumstark via TrendMicro's Zero Day Initiative 
        Impact high
        
        Description
        
        A compromised sandboxed content process can perform a Universal 
        Cross-site Scripting (UXSS) attack on content from any site it can 
        cause to be loaded in the same process. Because addons.mozilla.org 
        and accounts.firefox.com have close ties to the Firefox product, 
        malicious manipulation of these sites within the browser can 
        potentially be used to modify a user's Firefox configuration. These
        two sites will now be isolated into their own process and not 
        allowed to be loaded in a standard content process.
        
        References
        
          o Bug 1539595
        
        # CVE-2019-11743: Cross-origin access to unload event attributes
        
        Reporter Yoav Weiss Impact moderate
        
        Description
        
        Navigation events were not fully adhering to the W3C's 
        "Navigation-Timing Level 2" draft specification in some instances 
        for the unload event, which restricts access to detailed timing 
        attributes to only be same-origin. This resulted in potential 
        cross-origin information exposure of history through timing 
        side-channel attacks.
        
        References
        
          o Bug 1560495 o Navigation-Timing Level 2 specification
        
        # CVE-2019-11748: Persistence of WebRTC permissions in a third party
        context
        
        Reporter Jan-Ivar Bruaroey Impact moderate
        
        Description
        
        WebRTC in Firefox will honor persisted permissions given to sites 
        for access to microphone and camera resources even when in a 
        third-party context. In light of recent high profile vulnerabilities
        in other software, a decision was made to no longer persist these 
        permissions. This avoids the possibility of trusted WebRTC resources
        being invisibly embedded in web content and abusing permissions 
        previously given by users. Users will now be prompted for 
        permissions on each use.
        
        References
        
          o Bug 1564588
        
        # CVE-2019-11749: Camera information available without prompting 
        using getUserMedia
        
        Reporter Andreas Pehrson Impact moderate
        
        Description
        
        A vulnerability exists in WebRTC where malicious web content can use
        probing techniques on the getUserMedia API using constraints to 
        reveal device properties of cameras on the system without triggering
        a user prompt or notification. This allows for the potential 
        fingerprinting of users.
        
        References
        
          o Bug 1565374
        
        # CVE-2019-5849: Out-of-bounds read in Skia
        
        Reporter Zhen Zhou of NSFOCUS Security Team Impact moderate
        
        Description
        
        An out-of-bounds read vulnerability exists in the Skia graphics 
        library, allowing for the possible leaking of data from memory.
        
        References
        
          o Bug 1555838
        
        # CVE-2019-11750: Type confusion in Spidermonkey
        
        Reporter Qixun Zhao of Qihoo 360 Vulcan Team Impact moderate
        
        Description
        
        A type confusion vulnerability exists in Spidermonkey, which results
        in a non-exploitable crash.
        
        References
        
          o Bug 1568397
        
        # CVE-2019-11737: Content security policy directives ignore port and
        path if host is a wildcard
        
        Reporter Xiaoyin Liu Impact low
        
        Description
        
        If a wildcard ('*') is specified for the host in Content Security 
        Policy (CSP) directives, any port or path restriction of the 
        directive will be ignored, leading to CSP directives not being 
        properly applied to content.
        
        References
        
          o Bug 1388015
        
        # CVE-2019-11738: Content security policy bypass through hash-based
        sources in directives
        
        Reporter Wladimir Palant Impact low
        
        Description
        
        If a Content Security Policy (CSP) directive is defined that uses a
        hash-based source that takes the empty string as input, execution of
        any javascript: URIs will be allowed. This could allow for malicious
        JavaScript content to be run, bypassing CSP permissions.
        
        References
        
          o Bug 1452037
        
        # CVE-2019-11747: 'Forget about this site' removes sites from 
        pre-loaded HSTS list
        
        Reporter Thomas Henlich Impact low
        
        Description
        
        The "Forget about this site" feature in the History pane is intended
        to remove all saved user data that indicates a user has visited a 
        site. This includes removing any HTTP Strict Transport Security 
        (HSTS) settings received from sites that use it. Due to a bug, sites
        on the pre-load list also have their HSTS setting removed. On the 
        next visit to that site if the user specifies an http: URL rather 
        than secure https: they will not be protected by the pre-loaded HSTS
        setting. After that visit the site's HSTS setting will be restored.
        
        References
        
          o Bug 1564481
        
        # CVE-2019-11734: Memory safety bugs fixed in Firefox 69
        
        Reporter Mozilla developers and community Impact high
        
        Description
        
        Mozilla developers and community members Randell Jesup, Philipp, 
        Cosmin Sabou, and Natalia Csoregi reported memory safety bugs 
        present in Firefox 68. Some of these bugs showed evidence of memory
        corruption and we presume that with enough effort that some of these
        could be exploited to run arbitrary code.
        
        References
        
          o Memory safety bugs fixed in Firefox 69
        
        # CVE-2019-11735: Memory safety bugs fixed in Firefox 69 and Firefox
        ESR 68.1
        
        Reporter Mozilla developers and community Impact high
        
        Description
        
        Mozilla developers and community members Mikhail Gavrilov, Tyson 
        Smith, Marcia Knous, Tom Ritter, Philipp, and Bob Owens reported 
        memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of
        these bugs showed evidence of memory corruption and we presume that
        with enough effort that some of these could be exploited to run 
        arbitrary code.
        
        References
        
          o Memory safety bugs fixed in Firefox 69 and Firefox ESR 68.1
        
        # CVE-2019-11740: Memory safety bugs fixed in Firefox 69, Firefox 
        ESR 68.1, and Firefox ESR 60.9
        
        Reporter Mozilla developers and community Impact high
        
        Description
        
        Mozilla developers and community members Tyson Smith and Nathan 
        Froyd reported memory safety bugs present in Firefox 68, Firefox ESR
        68, and Firefox 60.8. Some of these bugs showed evidence of memory 
        corruption and we presume that with enough effort that some of these
        could be exploited to run arbitrary code.
        
        References
        
          o Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and 
        Firefox ESR 60.9" [1]
        
        "# CVE-2019-11751: Malicious code execution through command line 
        parameters
        
        Reporter Ping Fan (Zetta) Ke of VXRL working with iDefense Labs 
        Impact critical
        
        Description
        
        Logging-related command line parameters are not properly sanitized 
        when Firefox is launched by another program, such as when a user 
        clicks on malicious links in a chat application. This can be used to
        write a log file to an arbitrary location such as the Windows 
        'Startup' folder. Note: this issue only affects Firefox on Windows 
        operating systems.
        
        References
        
          o Bug 1572838
        
        # CVE-2019-11746: Use-after-free while manipulating video
        
        Reporter Nils Impact high
        
        Description
        
        A use-after-free vulnerability can occur while manipulating video 
        elements if the body is freed while still in use. This results in a
        potentially exploitable crash.
        
        References
        
          o Bug 1564449
        
        # CVE-2019-11744: XSS by breaking out of title and textarea elements
        using innerHTML
        
        Reporter Rakesh Mane Impact high
        
        Description
        
        Some HTML elements, such as <title> and <textarea> , can contain 
        literal angle brackets without treating them as markup. It is 
        possible to pass a literal closing tag to .innerHTML on these 
        elements, and subsequent content after that will be parsed as if it
        were outside the tag. This can lead to XSS if a site does not filter
        user input as strictly for these elements as it does for other 
        elements.
        
        References
        
          o Bug 1562033
        
        # CVE-2019-11742: Same-origin policy violation with SVG filters and
        canvas to steal cross-origin images
        
        Reporter Paul Stone Impact high
        
        Description
        
        A same-origin policy violation occurs allowing the theft of 
        cross-origin images through a combination of SVG filters and a 
        <canvas> element due to an error in how same-origin policy is 
        applied to cached image content. The resulting same-origin policy 
        violation could allow for data theft.
        
        References
        
          o Bug 1559715
        
        # CVE-2019-11736: File manipulation and privilege escalation in 
        Mozilla Maintenance Service
        
        Reporter Seb Patane Impact high
        
        Description
        
        The Mozilla Maintenance Service does not guard against files being 
        hardlinked to another file in the updates directory, allowing for 
        the replacement of local files, including the Maintenance Service 
        executable, which is run with privileged access. Additionally, there
        was a race condition during checks for junctions and symbolic links
        by the Maintenance Service, allowing for potential local file and 
        directory manipulation to be undetected in some circumstances. This
        allows for potential privilege escalation by a user with 
        unprivileged local access. Note: These attacks requires local system
        access and only affects Windows. Other operating systems are not 
        affected.
        
        References
        
          o Bug 1551913 o Bug 1552206
        
        # CVE-2019-11753: Privilege escalation with Mozilla Maintenance 
        Service in custom Firefox installation location
        
        Reporter Holger Fuhrmannek Impact high
        
        Description
        
        The Firefox installer allows Firefox to be installed to a custom 
        user writable location, leaving it unprotected from manipulation by
        unprivileged users or malware. If the Mozilla Maintenance Service is
        manipulated to update this unprotected location and the updated 
        maintenance service in the unprotected location has been altered, 
        the altered maintenance service can run with elevated privileges 
        during the update process due to a lack of integrity checks. This 
        allows for privilege escalation if the executable has been replaced
        locally. Note: This attack requires local system access and only 
        affects Windows. Other operating systems are not affected.
        
        References
        
          o Bug 1574980
        
        # CVE-2019-11752: Use-after-free while extracting a key value in 
        IndexedDB
        
        Reporter Zhanjia Song Impact high
        
        Description
        
        It is possible to delete an IndexedDB key value and subsequently try
        to extract it during conversion. This results in a use-after-free 
        and a potentially exploitable crash.
        
        References
        
          o Bug 1501152
        
        # CVE-2019-9812: Sandbox escape through Firefox Sync
        
        Reporter Niklas Baumstark via TrendMicro's Zero Day Initiative 
        Impact high
        
        Description
        
        Given a compromised sandboxed content process due to a separate 
        vulnerability, it is possible to escape that sandbox by loading 
        accounts.firefox.com in that process and forcing a log-in to a 
        malicious Firefox Sync account. Preference settings that disable the
        sandbox are then synchronized to the local machine and the 
        compromised browser would restart without the sandbox if a crash is
        triggered.
        
        References
        
          o Bug 1538008 o Bug 1538015
        
        # CVE-2019-11743: Cross-origin access to unload event attributes
        
        Reporter Yoav Weiss Impact moderate
        
        Description
        
        Navigation events were not fully adhering to the W3C's 
        "Navigation-Timing Level 2" draft specification in some instances 
        for the unload event, which restricts access to detailed timing 
        attributes to only be same-origin. This resulted in potential 
        cross-origin information exposure of history through timing 
        side-channel attacks.
        
        References
        
          o Bug 1560495 o Navigation-Timing Level 2 specification
        
        # CVE-2019-11748: Persistence of WebRTC permissions in a third party
        context
        
        Reporter Jan-Ivar Bruaroey Impact moderate
        
        Description
        
        WebRTC in Firefox will honor persisted permissions given to sites 
        for access to microphone and camera resources even when in a 
        third-party context. In light of recent high profile vulnerabilities
        in other software, a decision was made to no longer persist these 
        permissions. This avoids the possibility of trusted WebRTC resources
        being invisibly embedded in web content and abusing permissions 
        previously given by users. Users will now be prompted for 
        permissions on each use.
        
        References
        
          o Bug 1564588
        
        # CVE-2019-11749: Camera information available without prompting 
        using getUserMedia
        
        Reporter Andreas Pehrson Impact moderate
        
        Description
        
        A vulnerability exists in WebRTC where malicious web content can use
        probing techniques on the getUserMedia API using constraints to 
        reveal device properties of cameras on the system without triggering
        a user prompt or notification. This allows for the potential 
        fingerprinting of users.
        
        References
        
          o Bug 1565374
        
        # CVE-2019-11750: Type confusion in Spidermonkey
        
        Reporter Qixun Zhao of Qihoo 360 Vulcan Team Impact moderate
        
        Description
        
        A type confusion vulnerability exists in Spidermonkey, which results
        in a non-exploitable crash.
        
        References
        
          o Bug 1568397
        
        # CVE-2019-11738: Content security policy bypass through hash-based
        sources in directives
        
        Reporter Wladimir Palant Impact low
        
        Description
        
        If a Content Security Policy (CSP) directive is defined that uses a
        hash-based source that takes the empty string as input, execution of
        any javascript: URIs will be allowed. This could allow for malicious
        JavaScript content to be run, bypassing CSP permissions.
        
        References
        
          o Bug 1452037
        
        # CVE-2019-11747: 'Forget about this site' removes sites from 
        pre-loaded HSTS list
        
        Reporter Thomas Henlich Impact low
        
        Description
        
        The "Forget about this site" feature in the History pane is intended
        to remove all saved user data that indicates a user has visited a 
        site. This includes removing any HTTP Strict Transport Security 
        (HSTS) settings received from sites that use it. Due to a bug, sites
        on the pre-load list also have their HSTS setting removed. On the 
        next visit to that site if the user specifies an http: URL rather 
        than secure https: they will not be protected by the pre-loaded HSTS
        setting. After that visit the site's HSTS setting will be restored.
        
        References
        
          o Bug 1564481
        
        # CVE-2019-11735: Memory safety bugs fixed in Firefox 69 and Firefox
        ESR 68.1
        
        Reporter Mozilla developers and community Impact high
        
        Description
        
        Mozilla developers and community members Mikhail Gavrilov, Tyson 
        Smith, Marcia Knous, Tom Ritter, Philipp, and Bob Owens reported 
        memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of
        these bugs showed evidence of memory corruption and we presume that
        with enough effort that some of these could be exploited to run 
        arbitrary code.
        
        References
        
          o Memory safety bugs fixed in Firefox 69 and Firefox ESR 68.1
        
        # CVE-2019-11740: Memory safety bugs fixed in Firefox 69, Firefox 
        ESR 68.1, and Firefox ESR 60.9
        
        Reporter Mozilla developers and community Impact high
        
        Description
        
        Mozilla developers and community members Tyson Smith and Nathan 
        Froyd reported memory safety bugs present in Firefox 68, Firefox ESR
        68, and Firefox 60.8. Some of these bugs showed evidence of memory 
        corruption and we presume that with enough effort that some of these
        could be exploited to run arbitrary code.
        
        References
        
          o Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and 
        Firefox ESR 60.9" [2]
        
        "# CVE-2019-11746: Use-after-free while manipulating video
        
        Reporter Nils Impact high
        
        Description
        
        A use-after-free vulnerability can occur while manipulating video 
        elements if the body is freed while still in use. This results in a
        potentially exploitable crash.
        
        References
        
          o Bug 1564449
        
        # CVE-2019-11744: XSS by breaking out of title and textarea elements
        using innerHTML
        
        Reporter Rakesh Mane Impact high
        
        Description
        
        Some HTML elements, such as <title> and <textarea> , can contain 
        literal angle brackets without treating them as markup. It is 
        possible to pass a literal closing tag to .innerHTML on these 
        elements, and subsequent content after that will be parsed as if it
        were outside the tag. This can lead to XSS if a site does not filter
        user input as strictly for these elements as it does for other 
        elements.
        
        References
        
          o Bug 1562033
        
        # CVE-2019-11742: Same-origin policy violation with SVG filters and
        canvas to steal cross-origin images
        
        Reporter Paul Stone Impact high
        
        Description
        
        A same-origin policy violation occurs allowing the theft of 
        cross-origin images through a combination of SVG filters and a 
        <canvas> element due to an error in how same-origin policy is 
        applied to cached image content. The resulting same-origin policy 
        violation could allow for data theft.
        
        References
        
          o Bug 1559715
        
        # CVE-2019-11753: Privilege escalation with Mozilla Maintenance 
        Service in custom Firefox installation location
        
        Reporter Holger Fuhrmannek Impact high
        
        Description
        
        The Firefox installer allows Firefox to be installed to a custom 
        user writable location, leaving it unprotected from manipulation by
        unprivileged users or malware. If the Mozilla Maintenance Service is
        manipulated to update this unprotected location and the updated 
        maintenance service in the unprotected location has been altered, 
        the altered maintenance service can run with elevated privileges 
        during the update process due to a lack of integrity checks. This 
        allows for privilege escalation if the executable has been replaced
        locally. Note: This attack requires local system access and only 
        affects Windows. Other operating systems are not affected.
        
        References
        
          o Bug 1574980
        
        # CVE-2019-11752: Use-after-free while extracting a key value in 
        IndexedDB
        
        Reporter Zhanjia Song Impact high
        
        Description
        
        It is possible to delete an IndexedDB key value and subsequently try
        to extract it during conversion. This results in a use-after-free 
        and a potentially exploitable crash.
        
        References
        
          o Bug 1501152
        
        # CVE-2019-9812: Sandbox escape through Firefox Sync
        
        Reporter Niklas Baumstark via TrendMicro's Zero Day Initiative 
        Impact high
        
        Description
        
        Given a compromised sandboxed content process due to a separate 
        vulnerability, it is possible to escape that sandbox by loading 
        accounts.firefox.com in that process and forcing a log-in to a 
        malicious Firefox Sync account. Preference settings that disable the
        sandbox are then synchronized to the local machine and the 
        compromised browser would restart without the sandbox if a crash is
        triggered.
        
        References
        
          o Bug 1538008 o Bug 1538015
        
        # CVE-2019-11743: Cross-origin access to unload event attributes
        
        Reporter Yoav Weiss Impact moderate
        
        Description
        
        Navigation events were not fully adhering to the W3C's 
        "Navigation-Timing Level 2" draft specification in some instances 
        for the unload event, which restricts access to detailed timing 
        attributes to only be same-origin. This resulted in potential 
        cross-origin information exposure of history through timing 
        side-channel attacks.
        
        References
        
          o Bug 1560495 o Navigation-Timing Level 2 specification
        
        # CVE-2019-11740: Memory safety bugs fixed in Firefox 69, Firefox 
        ESR 68.1, and Firefox ESR 60.9
        
        Reporter Mozilla developers and community Impact high
        
        Description
        
        Mozilla developers and community members Tyson Smith and Nathan 
        Froyd reported memory safety bugs present in Firefox 68, Firefox ESR
        68, and Firefox 60.8. Some of these bugs showed evidence of memory 
        corruption and we presume that with enough effort that some of these
        could be exploited to run arbitrary code.
        
        References
        
          o Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and 
        Firefox ESR 60.9" [3]


MITIGATION

        The vendor recommends upgrading to the latest versions to address 
        these issues. [1-3]


REFERENCES

        [1] MFSA 2019-25 Security vulnerabilities fixed in Firefox 69
            https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/

        [2] MFSA 2019-26 Security vulnerabilities fixed in Firefox ESR 68.1
            https://www.mozilla.org/en-US/security/advisories/mfsa2019-26/

        [3] MFSA 2019-27 Security vulnerabilities fixed in Firefox ESR 60.9
            https://www.mozilla.org/en-US/security/advisories/mfsa2019-27/

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXW8MeGaOgq3Tt24GAQiDWg/+OyRvsK1wCNM+2f3OqENC/m22k40Syd/u
CJ3ggkcCzFVZu633o5v3M3b2lQemNb6MwzDdiZd9XHRg6ZlDH6QearN94N9swM0M
lLcJMFPUlrapzYW4kQ0btHgFjItzZ3LpdE+014Sp0jRcnXi7ET47Ha6O0U4/Uzkt
/TZA7nfqIHseMryFrdX88NJCBZa67z0c5nL4L3htS452CY7ZncLvdYE2ariNKXOH
wc5RLlyomD+jjDvui7lBPjJXSmtkfHSWHRlBd7tsqgZmlnMOgkpKKMBfpFLkf1Q3
aiPHR3ZJd+LEBo4hPTFcBLBbULwG0zfhCbZ9Ht+sGTlJSxe4nx4tLQEE6BAg+jnO
GhWtd16TtS6MP2n5W0zVNU6VU73GPu0+s2Haztzmfk+3/9OpZC66go9o6QXuPxYt
Br6cSkYsIPyDLC1hCN/BwmwswUB5KhjchvRS0epdD8qZ9ru8+gS3k8rox4AIN44m
YPHD6k6ZWZ7rH2bmPtpVqCFkC1YMBc40IX9+Y1D8J80M/CF6+i84tP08bjjMWY4D
TgbCX6FDbOQKLkdtWKlXlDU0OxqkkU4iFTNNL2d1jFFKUY2G5luijkfGHLKfF9jJ
m7YBjaMmLElqH3ZCgWfVPYoc37Why/gl4YHolE41dpfrdicwt+9npLj4puocVOIs
dpd39BdqIuQ=
=SLfA
-----END PGP SIGNATURE-----