Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
https://www.mozilla.org/security/advisories/mfsa2019-12/
https://www.mozilla.org/security/advisories/mfsa2019-10/
https://www.mozilla.org/security/advisories/mfsa2019-09/
https://bugzilla.mozilla.org/show_bug.cgi?id=1537924
https://access.redhat.com/errata/RHSA-2019:0966
https://access.redhat.com/errata/RHSA-2019:1144
http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
Source: MITRE
Published: 2019-04-26
Updated: 2022-03-30
Type: CWE-119
Base Score: 6.8
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 2.8
Severity: HIGH