Vulnerability Details : CVE-2019-11750
A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
Products affected by CVE-2019-11750
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-11750
0.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-11750
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2019-11750
-
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.Assigned by: nvd@nist.gov (Primary)
-
The product uses or accesses a resource that has not been initialized.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-11750
-
https://www.mozilla.org/security/advisories/mfsa2019-25/
Security vulnerabilities fixed in Firefox 69 — MozillaVendor Advisory
-
https://www.mozilla.org/security/advisories/mfsa2019-26/
Security vulnerabilities fixed in Firefox ESR 68.1 — MozillaVendor Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1568397
1568397 - (CVE-2019-11750) SpiderMonkey uninitialized memory leads to Type Confusion between "undefined" with any objectIssue Tracking;Permissions Required;Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
[security-announce] openSUSE-SU-2019:2251-1: important: Security update
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
[security-announce] openSUSE-SU-2019:2260-1: important: Security update
Jump to