Security News > 2021 > February > Critical Firefox Vulnerability Can Allow Code Execution If Chained With Other Bugs

Critical Firefox Vulnerability Can Allow Code Execution If Chained With Other Bugs
2021-02-09 14:09

An update released last week by Mozilla for Firefox 85 patches a critical information disclosure vulnerability that can be chained with other security flaws to achieve arbitrary code execution.

In its advisory for the vulnerability - the bug currently does not have a CVE identifier - Mozilla described it as a "Buffer overflow in depth pitch calculations for compressed textures." The issue, reported by researchers Abraruddin Khan and Omair through Trend Micro's Zero Day Initiative, apparently only impacts Firefox running on Windows - other operating systems are not affected.

ZDI vulnerability researcher Hossein Lotfi told SecurityWeek that the vulnerability is an information disclosure bug that exists within the implementation of the compressedTexImage3D API method in WebGL2.

"An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process."

ZDI is not aware of any attacks exploiting this vulnerability and there does not appear to be public knowledge of the flaw.

A patch is included in Firefox 85.0.1 and Firefox ESR 78.7.1.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/yhOZi8WjHzw/critical-firefox-vulnerability-can-allow-code-execution-if-chained-other-bugs