Rule Category

BROWSER-FIREFOX -- Snort has detected traffic known to exploit vulnerabilities present in the Firefox browser, or products that have the "Gecko" engine (Thunderbird email client, etc.).

Alert Message

BROWSER-FIREFOX Mozilla Firefox method array.prototype.push remote code execution attempt

Rule Explanation

This event is generated when attacker attempts to exploit a information lead in Mozilla Firefox Impact: Remote code execution Details: Ease of Attack: simple

What To Look For

No information provided

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

No rule groups

CVE

Additional Links

Rule Vulnerability

CVE Additional Information

CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
Details
Severity Base Score9.1
Impact Score5.2 Exploit Score3.9
Confidentiality ImpactHIGH Integrity ImpactNONE
Availability ImpactHIGH Access Vector
Authentication Ease of Access