Search for vulnerabilities
Vulnerability details: VCID-y2bh-deme-aaag
Vulnerability ID VCID-y2bh-deme-aaag
Aliases CVE-2019-11707
Summary A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, and Thunderbird < 60.7.2.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual High http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11707.html
rhas Critical https://access.redhat.com/errata/RHSA-2019:1603
rhas Critical https://access.redhat.com/errata/RHSA-2019:1604
rhas Important https://access.redhat.com/errata/RHSA-2019:1623
rhas Important https://access.redhat.com/errata/RHSA-2019:1624
rhas Important https://access.redhat.com/errata/RHSA-2019:1626
rhas Critical https://access.redhat.com/errata/RHSA-2019:1696
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11707.json
epss 0.68636 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.68636 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.68636 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.68636 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.80865 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.80865 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.80865 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.80865 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.80865 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.80865 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.80865 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.80865 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.80865 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.83224 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.84214 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.84214 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.84214 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.84214 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.84214 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.84214 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.84214 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.84214 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.84306 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
cvssv3.1 8.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
ssvc Attend https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=1721789
generic_textual High https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11707
generic_textual High https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11708
cvssv3 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-11707
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2019-11707
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2019-11707
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2019-11707
archlinux Critical https://security.archlinux.org/AVG-994
archlinux Critical https://security.archlinux.org/AVG-995
cvssv3.1 8.8 https://security.gentoo.org/glsa/201908-12
ssvc Attend https://security.gentoo.org/glsa/201908-12
generic_textual High https://ubuntu.com/security/notices/USN-4020-1
generic_textual High https://ubuntu.com/security/notices/USN-4045-1
generic_textual High https://usn.ubuntu.com/usn/usn-4020-1
generic_textual High https://usn.ubuntu.com/usn/usn-4045-1
generic_textual critical https://www.mozilla.org/en-US/security/advisories/mfsa2019-18
generic_textual High https://www.mozilla.org/en-US/security/advisories/mfsa2019-18/#CVE-2019-11707
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2019-20
cvssv3.1 8.8 https://www.mozilla.org/security/advisories/mfsa2019-18/
ssvc Attend https://www.mozilla.org/security/advisories/mfsa2019-18/
cvssv3.1 8.8 https://www.mozilla.org/security/advisories/mfsa2019-20/
cvssv3.1 8.8 https://www.mozilla.org/security/advisories/mfsa2019-20/
ssvc Attend https://www.mozilla.org/security/advisories/mfsa2019-20/
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11707.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11707.json
https://api.first.org/data/v1/epss?cve=CVE-2019-11707
https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11708
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4020-1
https://ubuntu.com/security/notices/USN-4045-1
https://usn.ubuntu.com/usn/usn-4020-1
https://usn.ubuntu.com/usn/usn-4045-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-18/#CVE-2019-11707
https://www.mozilla.org/security/advisories/mfsa2019-18/
https://www.mozilla.org/security/advisories/mfsa2019-20/
1721789 https://bugzilla.redhat.com/show_bug.cgi?id=1721789
ASA-201906-18 https://security.archlinux.org/ASA-201906-18
ASA-201906-19 https://security.archlinux.org/ASA-201906-19
AVG-994 https://security.archlinux.org/AVG-994
AVG-995 https://security.archlinux.org/AVG-995
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
CVE-2019-11707 Exploit https://bugs.chromium.org/p/project-zero/issues/detail?id=1820
CVE-2019-11707 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47038.txt
CVE-2019-11707 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/50691.txt
CVE-2019-11707 https://nvd.nist.gov/vuln/detail/CVE-2019-11707
mfsa2019-18 https://www.mozilla.org/en-US/security/advisories/mfsa2019-18
mfsa2019-20 https://www.mozilla.org/en-US/security/advisories/mfsa2019-20
RHSA-2019:1603 https://access.redhat.com/errata/RHSA-2019:1603
RHSA-2019:1604 https://access.redhat.com/errata/RHSA-2019:1604
RHSA-2019:1623 https://access.redhat.com/errata/RHSA-2019:1623
RHSA-2019:1624 https://access.redhat.com/errata/RHSA-2019:1624
RHSA-2019:1626 https://access.redhat.com/errata/RHSA-2019:1626
RHSA-2019:1696 https://access.redhat.com/errata/RHSA-2019:1696
USN-4020-1 https://usn.ubuntu.com/4020-1/
USN-4045-1 https://usn.ubuntu.com/4045-1/
Data source Exploit-DB
Date added Feb. 2, 2022
Description Mozilla Firefox 67 - Array.pop JIT Type Confusion
Ransomware campaign use Unknown
Source publication date Feb. 2, 2022
Exploit type local
Platform windows
Source update date Feb. 2, 2022
Data source KEV
Date added May 23, 2022
Description Mozilla Firefox and Thunderbird contain a type confusion vulnerability that can occur when manipulating JavaScript objects due to issues in Array.pop, allowing for an exploitable crash.
Required action Apply updates per vendor instructions.
Due date June 13, 2022
Note
https://nvd.nist.gov/vuln/detail/CVE-2019-11707
Ransomware campaign use Unknown
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11707.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:49:50Z/ Found at https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2019-11707
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-11707
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-11707
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-11707
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://security.gentoo.org/glsa/201908-12
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:49:50Z/ Found at https://security.gentoo.org/glsa/201908-12
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.mozilla.org/security/advisories/mfsa2019-18/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:49:50Z/ Found at https://www.mozilla.org/security/advisories/mfsa2019-18/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.mozilla.org/security/advisories/mfsa2019-20/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.mozilla.org/security/advisories/mfsa2019-20/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:49:50Z/ Found at https://www.mozilla.org/security/advisories/mfsa2019-20/
Exploit Prediction Scoring System (EPSS)
Percentile 0.98155
EPSS Score 0.68636
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.