• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
2 new mozilla firefox 0 day bugs under active attack —

2 New Mozilla Firefox 0-Day Bugs Under Active Attack — Patch Your Browser ASAP!

You are here: Home / General Cyber Security News / 2 New Mozilla Firefox 0-Day Bugs Under Active Attack — Patch Your Browser ASAP!
March 7, 2022

Mozilla has pushed out-of-band software program updates to its Firefox web browser to include two large-impact security vulnerabilities, equally of which it claims are currently being actively exploited in the wild.

Tracked as CVE-2022-26485 and CVE-2022-26486, the zero-working day flaws have been explained as use-after-free of charge issues impacting the Extensible Stylesheet Language Transformations (XSLT) parameter processing and the WebGPU inter-procedure conversation (IPC) Framework.

Automatic GitHub Backups

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


XSLT is an XML-based language applied for the conversion of XML files into web webpages or PDF paperwork, whilst WebGPU is an rising web regular that’s been billed as a successor to the recent WebGL JavaScript graphics library.

The description of the two flaws is down below –

  • CVE-2022-26485 – Taking away an XSLT parameter for the duration of processing could guide to an exploitable use-after-cost-free
  • CVE-2022-26486 – An unpredicted information in the WebGPU IPC framework could guide to a use-just after-free of charge and exploitable sandbox escape

Use-after-free bugs – which could be exploited to corrupt valid information and execute arbitrary code on compromised units – stem predominantly from a “confusion about which element of the software is accountable for releasing the memory.”

Prevent Data Breaches

Mozilla acknowledged that “We have experienced reports of attacks in the wild” weaponizing the two vulnerabilities but did not share any specialized particulars linked to the intrusions or the identities of the malicious actors exploiting them.

Security scientists Wang Gang, Liu Jialei, Du Sihang, Huang Yi, and Yang Kang of Qihoo 360 ATA have been credited with discovering and reporting the shortcomings.

In light of active exploitation of the flaws, users are suggested to upgrade as soon as probable to Firefox 97..2, Firefox ESR 91.6.1, Firefox for Android 97.3., Aim 97.3., and Thunderbird 91.6.2.

Found this post attention-grabbing? Stick to THN on Facebook, Twitter  and LinkedIn to go through a lot more exclusive material we post.


Some areas of this write-up are sourced from:
thehackernews.com

Previous Post: «new linux kernel cgroups vulnerability could let attackers escape container New Linux Kernel Cgroups Vulnerability Could Let Attackers Escape Container
Next Post: SharkBot Banking Malware Spreading via Fake Android Antivirus App on Google Play Store sharkbot banking malware spreading via fake android antivirus app on»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Sioux Falls Funds DSU Cybersecurity Lab
  • ‘CryptoRom’ Crypto-Scam is Back via Side-Loaded Apps
  • Irish Watchdog Fines Meta $19m Over Data Breach
  • Avast Merger Raises Competition Concerns
  • Linux botnet spreads using Log4Shell flaw
  • Another Destructive Wiper Targets Organizations in Ukraine
  • New “B1txor20” Linux Botnet Uses DNS Tunnel and Exploits Log4J Flaw
  • New Infinite Loop Bug in OpenSSL Could Let Attackers Crash Remote Servers
  • FBI, CISA Warn of Russian Hackers Exploiting MFA and PrintNightmare Bug
  • Unpatched RCE Bug in dompdf Project Affects HTML to PDF Converters

Copyright © TheCyberSecurity.News, All Rights Reserved.