A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
References
Link | Resource |
---|---|
https://www.mozilla.org/security/advisories/mfsa2019-11/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2019-08/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2019-07/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1525145 | Issue Tracking Permissions Required Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:0966 | |
https://access.redhat.com/errata/RHSA-2019:1144 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-04-26 10:29
Updated : 2019-05-13 03:29
NVD link : CVE-2019-9790
Mitre link : CVE-2019-9790
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
mozilla
- firefox
- firefox_esr
- thunderbird