{"id":19141,"date":"2022-05-28T19:03:57","date_gmt":"2022-05-29T03:03:57","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/05\/28\/news-12874\/"},"modified":"2022-05-28T19:03:57","modified_gmt":"2022-05-29T03:03:57","slug":"news-12874","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/05\/28\/news-12874\/","title":{"rendered":"Firefox, Thunderbird, receive patches for critical security issues"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Fri, 27 May 2022 11:06:49 +0000<\/strong><\/p>\n<p>Mozilla has published updates for two critical security issues in Firefox and Thunderbird, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/mozilla-fixes-firefox-thunderbird-zero-days-exploited-at-pwn2own\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">demonstrated during Pwn2Own Vancouver<\/a>. The vulnerabilities, discovered in the Firefox JavaScript engine (shared by the Firefox-based Tor browser) relate to Firefox 100.0.2, Firefox for Android 100.3.0, and Firefox ESR 91.9.1. For users of Thunderbird, the vulnerability there is in relation to Thunderbird 91.9.91.<\/p>\n<p>Additionally, there is some fallout beyond the standard versions of Firefox and Thunderbird. Users of the anti-surveillance <a href=\"https:\/\/tails.boum.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Tails Operating System<\/a> have been warned to stop using the bundled Tor browser until a fix goes live. This is because it could be <a href=\"https:\/\/portswigger.net\/daily-swig\/tails-users-warned-not-to-launch-bundled-tor-browser-until-security-fix-is-released\" target=\"_blank\" rel=\"noreferrer noopener\">potentially vulnerable<\/a> to CVE-2022-1802:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>This vulnerability allows a malicious website to bypass some of the security built in Tor Browser and access information from other websites.<\/p>\n<p>For example, after you visit a malicious website, an attacker controlling this website might access the password or other sensitive information that you send to other websites afterwards during the same Tails session.<\/p>\n<p>This vulnerability doesn&#8217;t break the anonymity and encryption of Tor connections.<\/p>\n<\/blockquote>\n<p>The fix for this Tails issue may not be seen until at least version 5.1. At time of writing, the expected release date for this is May 31.<\/p>\n<h2>The vulnerabilities<\/h2>\n<p>The <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2022-19\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">two issues<\/a> come with the following description:<\/p>\n<p><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-1802\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-1802<\/a> is a critical prototype pollution vulnerability. According to Mozilla, an attacker who was able to corrupt the methods of an Array object in JavaScript via prototype pollution, could have executed malicious JavaScript code in a privileged context.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-1529\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-1529<\/a> is another critical prototype pollution vulnerability. In this case, Mozilla says that untrusted user input was used in object indexing, leading to prototype pollution, which could have allowed an attacker to execute malicious JavaScript code in a privileged context.<\/p>\n<h2>Update now, if you haven&#8217;t already<\/h2>\n<p>Most installations of Thunderbird and Firefox will be set to update by default. If this is the case, you should already have the security fixes applied and you have nothing to worry about.<\/p>\n<p>This isn&#8217;t the case for all installations, however. If you <em>don&#8217;t<\/em> have Firefox or Thunderbird set to update automatically, the fix won&#8217;t be present. As a result, you&#8217;ll need to manually apply the update.<\/p>\n<p>In Firefox, navigate to <strong>Settings<\/strong> and then click <strong>General<\/strong> &gt; <strong>Firefox Updates<\/strong>.<\/p>\n<p>From here, select the most suitable option from <strong>Allow Firefox to<\/strong>:<\/p>\n<ul>\n<li>Automatically install updates<\/li>\n<li>Check for updates but let you choose to install them.<\/li>\n<\/ul>\n<p>The update process for Thunderbird is much the same as Firefox. By default, it&#8217;s set to <a href=\"https:\/\/support.mozilla.org\/en-US\/kb\/updating-thunderbird\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">update manually<\/a>, but you can select similar options to Firefox using the <a href=\"https:\/\/support.mozilla.org\/en-US\/kb\/advanced-panel-settings-in-thunderbird#w_update-tab\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Advanced option<\/a> in the Updates tab.<\/p>\n<p>With both of these tasks accomplished, you should no longer be at risk from either CVE.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/05\/firefox-thunderbird-receive-patches-for-critical-security-issues\/\">Firefox, Thunderbird, receive patches for critical security issues<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/05\/firefox-thunderbird-receive-patches-for-critical-security-issues\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Fri, 27 May 2022 11:06:49 +0000<\/strong><\/p>\n<p>Critical updates have been released for both Firefox and Thunderbird. Apply now if you haven&#8217;t already\u2014we explain how.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/05\/firefox-thunderbird-receive-patches-for-critical-security-issues\/\">Firefox, Thunderbird, receive patches for critical security issues<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[26298,26299,11638,22783,11122,15931,10467],"class_list":["post-19141","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cve-2022-1529","tag-cve-2022-1802","tag-exploit","tag-exploits-and-vulnerabilities","tag-firefox","tag-thunderbird","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19141"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19141\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}