If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data. This vulnerability affects Firefox < 66.
Si un proceso contenido de Sandbox se ve comprometido, puede iniciar una descarga de FTP que luego usará un proceso secundario para procesar los datos descargados. Los datos descargados pueden ser pasados al proceso de Chrome con una longitud de archivo arbitraria proporcionada por un atacante, omitiendo las protecciones de la sandbox y permitiendo una lectura de memoria potencial de datos adyacentes del proceso de Chrome privilegiado, que puede incluir datos confidenciales. Esta vulnerabilidad afecta a Firefox versión anterior a la 66.
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, denial of service via successive FTP authorization prompts or modal alerts, trick the user with confusing permission request prompts, obtain sensitive information, conduct social engineering attacks, or execute arbitrary code. Various other issues were also addressed.