{"id":"UBUNTU-CVE-2019-9812","details":"Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR \u003c 60.9, Firefox ESR \u003c 68.1, and Firefox \u003c 69.","modified":"2026-04-22T12:24:28.577316Z","published":"2019-09-04T00:00:00Z","related":["USN-4122-1"],"upstream":["CVE-2019-9812"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-9812"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/#CVE-2019-9812"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4122-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-9812"}],"affected":[{"package":{"name":"firefox","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/firefox@69.0+build2-0ubuntu0.16.04.4?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"69.0+build2-0ubuntu0.16.04.4"}]}],"versions":["41.0.2+build2-0ubuntu1","42.0+build2-0ubuntu1","44.0+build3-0ubuntu2","44.0.1+build1-0ubuntu1","44.0.2+build1-0ubuntu1","45.0+build2-0ubuntu1","45.0.1+build1-0ubuntu1","45.0.2+build1-0ubuntu1","46.0+build5-0ubuntu0.16.04.2","46.0.1+build1-0ubuntu0.16.04.2","47.0+build3-0ubuntu0.16.04.1","48.0+build2-0ubuntu0.16.04.1","49.0+build4-0ubuntu0.16.04.1","49.0.2+build2-0ubuntu0.16.04.2","50.0+build2-0ubuntu0.16.04.2","50.0.2+build1-0ubuntu0.16.04.1","50.1.0+build2-0ubuntu0.16.04.1","51.0.1+build2-0ubuntu0.16.04.1","51.0.1+build2-0ubuntu0.16.04.2","52.0+build2-0ubuntu0.16.04.1","52.0.1+build2-0ubuntu0.16.04.1","52.0.2+build1-0ubuntu0.16.04.1","53.0+build6-0ubuntu0.16.04.1","53.0.2+build1-0ubuntu0.16.04.2","53.0.3+build1-0ubuntu0.16.04.2","54.0+build3-0ubuntu0.16.04.1","55.0.1+build2-0ubuntu0.16.04.2","55.0.2+build1-0ubuntu0.16.04.1","56.0+build6-0ubuntu0.16.04.1","56.0+build6-0ubuntu0.16.04.2","57.0+build4-0ubuntu0.16.04.5","57.0+build4-0ubuntu0.16.04.6","57.0.1+build2-0ubuntu0.16.04.1","57.0.3+build1-0ubuntu0.16.04.1","57.0.4+build1-0ubuntu0.16.04.1","58.0+build6-0ubuntu0.16.04.1","58.0.1+build1-0ubuntu0.16.04.1","58.0.2+build1-0ubuntu0.16.04.1","59.0+build5-0ubuntu0.16.04.1","59.0.1+build1-0ubuntu0.16.04.1","59.0.2+build1-0ubuntu0.16.04.1","59.0.2+build1-0ubuntu0.16.04.3","60.0+build2-0ubuntu0.16.04.1","60.0.1+build2-0ubuntu0.16.04.1","60.0.2+build1-0ubuntu0.16.04.1","61.0+build3-0ubuntu0.16.04.2","61.0.1+build1-0ubuntu0.16.04.1","62.0+build2-0ubuntu0.16.04.3","62.0+build2-0ubuntu0.16.04.4","62.0+build2-0ubuntu0.16.04.5","62.0.3+build1-0ubuntu0.16.04.2","63.0+build2-0ubuntu0.16.04.2","63.0.3+build1-0ubuntu0.16.04.1","64.0+build3-0ubuntu0.16.04.1","65.0+build2-0ubuntu0.16.04.1","65.0.1+build2-0ubuntu0.16.04.1","66.0+build3-0ubuntu0.16.04.2","66.0.1+build1-0ubuntu0.16.04.1","66.0.2+build1-0ubuntu0.16.04.1","66.0.3+build1-0ubuntu0.16.04.1","66.0.4+build3-0ubuntu0.16.04.1","66.0.5+build1-0ubuntu0.16.04.1","67.0+build2-0ubuntu0.16.04.1","67.0.1+build1-0ubuntu0.16.04.1","67.0.2+build2-0ubuntu0.16.04.1","67.0.3+build1-0ubuntu0.16.04.1","67.0.4+build1-0ubuntu0.16.04.1","68.0+build3-0ubuntu0.16.04.1","68.0.1+build1-0ubuntu0.16.04.1","68.0.2+build1-0ubuntu0.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"69.0+build2-0ubuntu0.16.04.4","binary_name":"firefox"},{"binary_version":"69.0+build2-0ubuntu0.16.04.4","binary_name":"firefox-geckodriver"},{"binary_version":"69.0+build2-0ubuntu0.16.04.4","binary_name":"firefox-mozsymbols"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9812.json"}},{"package":{"name":"firefox","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/firefox@69.0+build2-0ubuntu0.18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"69.0+build2-0ubuntu0.18.04.1"}]}],"versions":["56.0+build6-0ubuntu1","57.0.1+build2-0ubuntu1","59.0.1+build1-0ubuntu1","59.0.2+build1-0ubuntu1","60.0+build2-0ubuntu1","60.0.1+build2-0ubuntu0.18.04.1","60.0.2+build1-0ubuntu0.18.04.1","61.0+build3-0ubuntu0.18.04.1","61.0.1+build1-0ubuntu0.18.04.1","62.0+build2-0ubuntu0.18.04.3","62.0+build2-0ubuntu0.18.04.4","62.0+build2-0ubuntu0.18.04.5","62.0.3+build1-0ubuntu0.18.04.1","63.0+build2-0ubuntu0.18.04.2","63.0.3+build1-0ubuntu0.18.04.1","64.0+build3-0ubuntu0.18.04.1","65.0+build2-0ubuntu0.18.04.1","65.0.1+build2-0ubuntu0.18.04.1","66.0+build3-0ubuntu0.18.04.1","66.0.1+build1-0ubuntu0.18.04.1","66.0.2+build1-0ubuntu0.18.04.1","66.0.3+build1-0ubuntu0.18.04.1","66.0.4+build3-0ubuntu0.18.04.1","66.0.5+build1-0ubuntu0.18.04.1","67.0+build2-0ubuntu0.18.04.1","67.0.1+build1-0ubuntu0.18.04.1","67.0.2+build2-0ubuntu0.18.04.1","67.0.3+build1-0ubuntu0.18.04.1","67.0.4+build1-0ubuntu0.18.04.1","68.0+build3-0ubuntu0.18.04.1","68.0.1+build1-0ubuntu0.18.04.1","68.0.2+build1-0ubuntu0.18.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"69.0+build2-0ubuntu0.18.04.1","binary_name":"firefox"},{"binary_version":"69.0+build2-0ubuntu0.18.04.1","binary_name":"firefox-geckodriver"},{"binary_version":"69.0+build2-0ubuntu0.18.04.1","binary_name":"firefox-mozsymbols"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9812.json"}},{"package":{"name":"mozjs52","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/mozjs52@52.9.1-0ubuntu0.18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["52.3.1-0ubuntu3","52.3.1-7fakesync1","52.8.1-0ubuntu0.18.04.1","52.9.1-0ubuntu0.18.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"52.9.1-0ubuntu0.18.04.1","binary_name":"libmozjs-52-0"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9812.json"}},{"package":{"name":"mozjs38","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/mozjs38@38.8.0~repack1-0ubuntu4?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["38.8.0~repack1-0ubuntu1","38.8.0~repack1-0ubuntu3","38.8.0~repack1-0ubuntu4"],"ecosystem_specific":{"binaries":[{"binary_version":"38.8.0~repack1-0ubuntu4","binary_name":"libmozjs-38-0"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9812.json"}},{"package":{"name":"mozjs52","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/mozjs52@52.9.1-1ubuntu3?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["52.9.1-1build1","52.9.1-1ubuntu3"],"ecosystem_specific":{"binaries":[{"binary_version":"52.9.1-1ubuntu3","binary_name":"libmozjs-52-0"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9812.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}