Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2019-17026

Description

Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 68.4.1, Thunderbird < 68.4.1, and Firefox < 72.0.1.

POC

Reference

- http://packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html

- https://bugzilla.mozilla.org/show_bug.cgi?id=1607443

Github

- https://github.com/0xT11/CVE-POC

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Enes4xd/Enes4xd

- https://github.com/HackOvert/awesome-bugs

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/alphaSeclab/sec-daily-2020

- https://github.com/cloudrise/lansweeper-reports

- https://github.com/cr0ss2018/cr0ss2018

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/ezelnur6327/Enes4xd

- https://github.com/ezelnur6327/ezelnur6327

- https://github.com/forrest-orr/DoubleStar

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/lsw29475/CVE-2019-17026

- https://github.com/maxpl0it/CVE-2019-17026-Exploit

- https://github.com/mgaudet/SpiderMonkeyBibliography

- https://github.com/v3nt4n1t0/DetectMozillaFirefoxVulnDomain.ps1