IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Mozilla patches two Firefox zero-day vulnerabilities

Memory bugs fixed in Firefox desktop and mobile browsers along with Mozilla's Thunderbird client

Mozilla has fixed two memory-related vulnerabilities in its Firefox browser that hackers were exploiting in the wild.

The bugs are fixed in Firefox 97.0.2, Firefox for Android 97.3.0, and version 81.6.1 of Firefox Extended Support Release (ESR), which is an enterprise version of the browser. They also affect Firefox Focus, the Foundation's privacy-focused mobile browser, and its Thunderbird mail client. 

Related Resource

The secure cloud configuration imperative

The central role of cloud security posture management

The secure cloud configuration imperativeFree download

CVE-2022-26485 is a use-after-free bug, in which developers don't clear a pointer to a memory location after freeing that portion of memory.

That allows an attacker to use an error to hack the program. In this case, the bug lies with the implementation of Extensible Stylesheet Language Transformations (XSLT), which is a language for transforming XML documents into other document formats.

Removing an XSLT parameter during processing could lead to an exploit, Mozilla said. The National Vulnerability Database gives this bug a CVSS score of 9.8 (critical).

CVE-2022-26486 is also a use-after-free bug, this time in the WebGPU IPC Framework. WebGPU is a web API that lets the browser use the system's GPU for calculations and drawing complex images inside a web page. Unexpected input fed to the framework could allow an attacker to escape the sandbox designed to contain malicious activity, Mozilla's advisory warned. This bug got a CVSS score of 6.0 (medium).

Mozilla said that it had received reports of attacks in the wild exploiting both of these bugs. VulDB, a database that tracks and collates bug information, believes that an exploit of the WebGPU bug could fetch up to $25,000.

The Foundation attributed discovery of the bugs to researchers at Chinese security team Qihoo 360 ATA.

Mozilla has rushed to fix zero-day bugs in Firefox before. Two years ago it released patches for use-after-free vulnerabilities that it said attackers were exploiting in the wild.

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Most Popular

The UK's best cities for tech workers in 2022
Business strategy

The UK's best cities for tech workers in 2022

24 Jun 2022
LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022
Salaries for the least popular programming languages surge as much as 44%
Development

Salaries for the least popular programming languages surge as much as 44%

23 Jun 2022