{"id":"USN-6201-1","summary":"firefox vulnerabilities","details":"Multiple security issues were discovered in Firefox. If a user were\ntricked into opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, obtain sensitive\ninformation across domains, or execute arbitrary code. (CVE-2023-37201,\nCVE-2023-37202, CVE-2023-37205, CVE-2023-37207, CVE-2023-37209,\nCVE-2023-37210, CVE-2023-37211, CVE-2023-37212)\n\nMartin Hostettler discovered that Firefox did not properly block storage of\nall cookies when configured. An attacker could potentially exploits this\nissue to store tracking data without permission in localstorage.\n(CVE-2023-3482)\n\nPaul Nickerson discovered that Firefox did have insufficient validation in\nthe Drag and Drop API. If a user were tricked into creating a shortcut to\nlocal system files, an attacker could execute arbitrary code.\n(CVE-2023-37203)\n\nIrvan Kurniawan discovered that Firefox did not properly manage fullscreen\nnotifications using an option element having an expensive computational\nfunction. An attacker could potentially exploit this issue to perform\nspoofing attacks. (CVE-2023-37204)\n\nAmeen Basha M K discovered that Firefox did not properly validate symlinks\nin the FileSystem API. If a user were tricked into uploading a symlinked\nfile to a malicious website, an attacker could obtain sensitive information.\n(CVE-2023-37206)\n\nPuf discovered that Firefox did not properly provide warning when opening\nDiagcab files. If a user were tricked into opening a malicicous Diagcab\nfile, an attacker could execute arbitrary code. (CVE-2023-37208)\n","modified":"2026-02-10T04:43:11Z","published":"2023-07-05T09:23:05Z","related":["UBUNTU-CVE-2023-3482","UBUNTU-CVE-2023-37201","UBUNTU-CVE-2023-37202","UBUNTU-CVE-2023-37203","UBUNTU-CVE-2023-37204","UBUNTU-CVE-2023-37205","UBUNTU-CVE-2023-37206","UBUNTU-CVE-2023-37207","UBUNTU-CVE-2023-37208","UBUNTU-CVE-2023-37209","UBUNTU-CVE-2023-37210","UBUNTU-CVE-2023-37211","UBUNTU-CVE-2023-37212"],"upstream":["CVE-2023-3482","CVE-2023-37201","CVE-2023-37202","CVE-2023-37203","CVE-2023-37204","CVE-2023-37205","CVE-2023-37206","CVE-2023-37207","CVE-2023-37208","CVE-2023-37209","CVE-2023-37210","CVE-2023-37211","CVE-2023-37212","UBUNTU-CVE-2023-3482","UBUNTU-CVE-2023-37201","UBUNTU-CVE-2023-37202","UBUNTU-CVE-2023-37203","UBUNTU-CVE-2023-37204","UBUNTU-CVE-2023-37205","UBUNTU-CVE-2023-37206","UBUNTU-CVE-2023-37207","UBUNTU-CVE-2023-37208","UBUNTU-CVE-2023-37209","UBUNTU-CVE-2023-37210","UBUNTU-CVE-2023-37211","UBUNTU-CVE-2023-37212"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6201-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3482"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-37201"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-37202"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-37203"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-37204"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-37205"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-37206"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-37207"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-37208"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-37209"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-37210"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-37211"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-37212"}],"affected":[{"package":{"name":"firefox","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/firefox@115.0+build2-0ubuntu0.20.04.3?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"115.0+build2-0ubuntu0.20.04.3"}]}],"versions":["69.0.3+build1-0ubuntu1","70.0+build2-0ubuntu1","70.0+build2-0ubuntu2","70.0.1+build1-0ubuntu2","71.0+build2-0ubuntu2","71.0+build5-0ubuntu1","72.0.1+build1-0ubuntu1","72.0.2+build1-0ubuntu1","73.0+build1-0ubuntu1","73.0+build2-0ubuntu1","73.0+build3-0ubuntu1","73.0.1+build1-0ubuntu1","74.0+build1-0ubuntu1","74.0+build2-0ubuntu1","74.0+build2-0ubuntu2","74.0+build3-0ubuntu1","75.0+build3-0ubuntu1","76.0+build2-0ubuntu0.20.04.1","76.0.1+build1-0ubuntu0.20.04.1","77.0.1+build1-0ubuntu0.20.04.1","78.0.1+build1-0ubuntu0.20.04.1","78.0.2+build2-0ubuntu0.20.04.1","79.0+build1-0ubuntu0.20.04.1","80.0+build2-0ubuntu0.20.04.1","80.0.1+build1-0ubuntu0.20.04.1","81.0+build2-0ubuntu0.20.04.1","81.0.2+build1-0ubuntu0.20.04.1","82.0+build2-0ubuntu0.20.04.1","82.0.2+build1-0ubuntu0.20.04.1","82.0.3+build1-0ubuntu0.20.04.1","83.0+build2-0ubuntu0.20.04.1","84.0+build3-0ubuntu0.20.04.1","84.0.1+build1-0ubuntu0.20.04.1","84.0.2+build1-0ubuntu0.20.04.1","85.0+build1-0ubuntu0.20.04.1","85.0.1+build1-0ubuntu0.20.04.1","86.0+build3-0ubuntu0.20.04.1","86.0.1+build1-0ubuntu0.20.04.1","87.0+build3-0ubuntu0.20.04.2","88.0+build2-0ubuntu0.20.04.1","88.0.1+build1-0ubuntu0.20.04.2","89.0+build2-0ubuntu0.20.04.2","89.0.1+build1-0ubuntu0.20.04.1","89.0.2+build1-0ubuntu0.20.04.1","90.0+build1-0ubuntu0.20.04.1","90.0.2+build1-0ubuntu0.20.04.1","91.0+build2-0ubuntu0.20.04.1","91.0.1+build1-0ubuntu0.20.04.1","91.0.2+build1-0ubuntu0.20.04.1","92.0+build3-0ubuntu0.20.04.1","93.0+build1-0ubuntu0.20.04.1","94.0+build3-0ubuntu0.20.04.1","95.0+build1-0ubuntu0.20.04.1","95.0.1+build2-0ubuntu0.20.04.1","96.0+build2-0ubuntu0.20.04.1","97.0+build2-0ubuntu0.20.04.1","97.0.2+build1-0ubuntu0.20.04.1","98.0+build3-0ubuntu0.20.04.2","98.0.1+build2-0ubuntu0.20.04.1","98.0.2+build1-0ubuntu0.20.04.1","99.0+build2-0ubuntu0.20.04.2","100.0+build2-0ubuntu0.20.04.1","100.0.2+build1-0ubuntu0.20.04.1","101.0.1+build1-0ubuntu0.20.04.1","102.0+build2-0ubuntu0.20.04.1","103.0+build1-0ubuntu0.20.04.1","104.0+build3-0ubuntu0.20.04.1","105.0+build2-0ubuntu0.20.04.1","106.0.2+build1-0ubuntu0.20.04.1","106.0.5+build1-0ubuntu0.20.04.1","107.0+build2-0ubuntu0.20.04.1","108.0+build2-0ubuntu0.20.04.1","108.0.1+build1-0ubuntu0.20.04.1","108.0.2+build1-0ubuntu0.20.04.1","109.0+build2-0ubuntu0.20.04.1","109.0.1+build1-0ubuntu0.20.04.2","110.0+build3-0ubuntu0.20.04.1","110.0.1+build2-0ubuntu0.20.04.1","111.0+build2-0ubuntu0.20.04.1","111.0.1+build2-0ubuntu0.20.04.1","112.0+build2-0ubuntu0.20.04.1","112.0.1+build1-0ubuntu0.20.04.1","112.0.2+build1-0ubuntu0.20.04.1","113.0+build2-0ubuntu0.20.04.1","113.0.1+build1-0ubuntu0.20.04.1","113.0.2+build1-0ubuntu0.20.04.1","114.0+build3-0ubuntu0.20.04.1","114.0.1+build1-0ubuntu0.20.04.1","114.0.2+build1-0ubuntu0.20.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"115.0+build2-0ubuntu0.20.04.3","binary_name":"firefox"},{"binary_version":"115.0+build2-0ubuntu0.20.04.3","binary_name":"firefox-dev"},{"binary_version":"115.0+build2-0ubuntu0.20.04.3","binary_name":"firefox-geckodriver"},{"binary_version":"115.0+build2-0ubuntu0.20.04.3","binary_name":"firefox-mozsymbols"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6201-1.json","cves_map":{"cves":[{"id":"CVE-2023-3482","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-37201","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-37202","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-37203","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-37204","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-37205","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-37206","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-37207","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-37208","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-37209","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-37210","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-37211","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-37212","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:20.04:LTS"}}}],"schema_version":"1.7.3"}