CERT-In identifies multiple high severity vulnerabilities in Mozilla Firefox, Oracle products

CERT-In issued alerts on Monday outlining multiple high-severity vulnerabilities in Mozilla Firefox and Oracle products. The vulnerabilities are said to be used by remote attackers to bypass security restrictions and execute arbitrary code on affected systems.

August 02, 2022 12:57 pm | Updated 12:57 pm IST

CERT-In issued alerts on Monday outlining multiple high-severity vulnerabilities in Mozilla Firefox and Oracle products

CERT-In issued alerts on Monday outlining multiple high-severity vulnerabilities in Mozilla Firefox and Oracle products | Photo Credit: Reuters

The vulnerabilities reported in Mozilla Firefox can allow a remote attacker to bypass security restrictions, access sensitive information, perform spoofing attacks, execute arbitrary code and cause a denial of service on target systems. 

(Sign up to our Technology newsletter, Today’s Cache, for insights on emerging themes at the intersection of technology, business and policy. Click here to subscribe for free.)

These vulnerabilities exist due to memory safety bugs within the browser that can be triggered while opening local <code>.Ink </code> files, preload cache that bypasses subresource integrity. This can cause a leak of cross-site resources while redirecting information when using the performance API. 

The vulnerability can cause hanging of user interface while visiting a website with a long URL, mouse position spoofing with CSS transforms, directory indexes for bundled resources, and reflected URL parameters

The threat alert also points out that successful exploitation of these vulnerabilities can allow attackers to open specially crafted web requests and bypass security restrictions thus gaining access to sensitive information to perform spoofing attacks on targeted systems. 

The vulnerabilities can be fixed by updating to Mozilla Firefox version 103, Mozilla Firefox ESR version 102.1 and 91.12. 

In Oracle 

Vulnerabilities have been reported in multiple Oracle products which can be exploited by attackers to execute arbitrary code to bypass security restrictions and gain unauthorised access to resources on targeted systems 

The vulnerabilities have been reported in various components of Oracle products and some of them can be exploited over a network without requiring user credentials. 

According to the report from CERT-In, these vulnerabilities can be used by an attacker to execute arbitrary code, bypass security restrictions and gain unauthorized access to restricted resources on the targeted system.

The report recommends applying appropriate security updates mentioned in Oracle’s critical security patch update for July 2022 to fix the vulnerabilities.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.