CVE-2020-15678
📋 TL;DR
This is a use-after-free vulnerability in Firefox, Thunderbird, and Firefox ESR that occurs when processing graphical layers during scrolling. An attacker could exploit this to execute arbitrary code or cause a denial of service. All users of affected versions are vulnerable.
💻 Affected Systems
- Firefox
- Thunderbird
- Firefox ESR
📦 What is this software?
Firefox by Mozilla
Firefox Esr by Mozilla
Leap by Opensuse
Leap by Opensuse
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or ransomware deployment.
Likely Case
Browser crash/denial of service or limited code execution in browser sandbox.
If Mitigated
No impact if patched versions are deployed or vulnerable browsers are isolated.
🎯 Exploit Status
Exploitation requires user interaction (visiting malicious website) but no authentication. Use-after-free vulnerabilities often require heap manipulation expertise.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 81+, Thunderbird 78.3+, Firefox ESR 78.3+
Vendor Advisory: https://bugzilla.mozilla.org/show_bug.cgi?id=1660211
Restart Required: Yes
Instructions:
1. Open browser. 2. Go to Settings/About. 3. Allow automatic update or download latest version from official site. 4. Restart browser.
🔧 Temporary Workarounds
Disable JavaScript
allPrevents exploitation via malicious websites but breaks most web functionality.
about:config -> javascript.enabled = false
Use Content Security Policy
allRestrict script execution to trusted sources only.
Add CSP headers to web servers
🧯 If You Can't Patch
- Isolate vulnerable browsers using network segmentation
- Implement application whitelisting to prevent unknown processes
🔍 How to Verify
Check if Vulnerable:
Check browser version in Settings/About menu.
Check Version:
firefox --version or thunderbird --version
Verify Fix Applied:
Confirm version is Firefox ≥81, Thunderbird ≥78.3, or Firefox ESR ≥78.3.
📡 Detection & Monitoring
Log Indicators:
- Browser crash reports
- Unexpected process termination
Network Indicators:
- Connections to suspicious domains followed by browser crashes
SIEM Query:
source="browser.logs" AND (event="crash" OR event="segfault") AND version<81
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1660211
- https://lists.debian.org/debian-lts-announce/2020/10/msg00020.html
- https://security.gentoo.org/glsa/202010-02
- https://www.debian.org/security/2020/dsa-4770
- https://www.mozilla.org/security/advisories/mfsa2020-42/
- https://www.mozilla.org/security/advisories/mfsa2020-43/
- https://www.mozilla.org/security/advisories/mfsa2020-44/
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1660211
- https://lists.debian.org/debian-lts-announce/2020/10/msg00020.html
- https://security.gentoo.org/glsa/202010-02
- https://www.debian.org/security/2020/dsa-4770
- https://www.mozilla.org/security/advisories/mfsa2020-42/
- https://www.mozilla.org/security/advisories/mfsa2020-43/
- https://www.mozilla.org/security/advisories/mfsa2020-44/