CVE-2019-11708
📋 TL;DR
This vulnerability allows a compromised child process in Firefox/Thunderbird to trick the parent process into opening malicious web content, potentially leading to arbitrary code execution when combined with other vulnerabilities. It affects Firefox ESR before 60.7.2, Firefox before 67.0.4, and Thunderbird before 60.7.2. Users of these outdated versions are at risk.
💻 Affected Systems
- Mozilla Firefox
- Mozilla Firefox ESR
- Mozilla Thunderbird
📦 What is this software?
Firefox by Mozilla
Firefox by Mozilla
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with arbitrary code execution leading to complete control of the user's computer, data theft, and lateral movement.
Likely Case
Browser compromise leading to session hijacking, credential theft, and installation of malware or backdoors.
If Mitigated
Limited impact with only browser-level compromise if proper sandboxing and security controls are in place.
🎯 Exploit Status
Exploit requires chaining with additional vulnerabilities for full code execution. Public exploit code exists in the wild.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox ESR 60.7.2, Firefox 67.0.4, Thunderbird 60.7.2
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2019-19/
Restart Required: Yes
Instructions:
1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Allow automatic update to complete. 4. Restart the application when prompted.
🔧 Temporary Workarounds
Disable JavaScript
allTemporarily reduces attack surface by disabling JavaScript execution
about:config → javascript.enabled = false
🧯 If You Can't Patch
- Discontinue use of affected browsers for sensitive activities
- Implement application whitelisting to block execution of malicious payloads
🔍 How to Verify
Check if Vulnerable:
Check browser version in About dialog: Firefox ESR < 60.7.2, Firefox < 67.0.4, Thunderbird < 60.7.2
Check Version:
firefox --version | thunderbird --version
Verify Fix Applied:
Confirm version is Firefox ESR ≥ 60.7.2, Firefox ≥ 67.0.4, or Thunderbird ≥ 60.7.2
📡 Detection & Monitoring
Log Indicators:
- Unusual child process termination
- Unexpected IPC messages between browser processes
- Multiple prompt:open requests
Network Indicators:
- Connections to known malicious domains following browser compromise
- Unusual outbound traffic patterns
SIEM Query:
source="browser_logs" AND (event="process_crash" OR event="ipc_violation")
🔗 References
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559858
- https://security.gentoo.org/glsa/201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-19/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559858
- https://security.gentoo.org/glsa/201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-19/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11708