Risk | High |
Patch available | YES |
Number of vulnerabilities | 8 |
CVE-ID | CVE-2023-32205 CVE-2023-32206 CVE-2023-32207 CVE-2023-32211 CVE-2023-32212 CVE-2023-32213 CVE-2023-32214 CVE-2023-32215 |
CWE-ID | CWE-451 CWE-125 CWE-254 CWE-843 CWE-119 CWE-939 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Desktop Applications Module Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 SP3 LTSS Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 SP2 LTSS Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing LTSS 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing ESPOS 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 15 Operating systems & Components / Operating system SUSE Enterprise Storage Operating systems & Components / Operating system SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system MozillaFirefox-translations-other Operating systems & Components / Operating system package or component MozillaFirefox-debugsource Operating systems & Components / Operating system package or component MozillaFirefox-devel Operating systems & Components / Operating system package or component MozillaFirefox Operating systems & Components / Operating system package or component MozillaFirefox-translations-common Operating systems & Components / Operating system package or component MozillaFirefox-branding-upstream Operating systems & Components / Operating system package or component MozillaFirefox-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 8 vulnerabilities.
EUVDB-ID: #VU75874
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-32205
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data. A remote attacker can obscure browser prompts and perform spoofing attack.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP4
SUSE Linux Enterprise Server 15: SP2 - SP4
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Real Time 15: SP3 - SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP4
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Desktop 15: SP4
SUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
MozillaFirefox-translations-other: before 102.11.0-150200.152.87.1
MozillaFirefox-debugsource: before 102.11.0-150200.152.87.1
MozillaFirefox-devel: before 102.11.0-150200.152.87.1
MozillaFirefox: before 102.11.0-150200.152.87.1
MozillaFirefox-translations-common: before 102.11.0-150200.152.87.1
MozillaFirefox-branding-upstream: before 102.11.0-150200.152.87.1
MozillaFirefox-debuginfo: before 102.11.0-150200.152.87.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232173-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75875
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-32206
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in the RLBox Expat driver. A remote attacker can trick the victim to open a specially crafted website, trigger an out-of-bounds read error and crash the browser.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP4
SUSE Linux Enterprise Server 15: SP2 - SP4
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Real Time 15: SP3 - SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP4
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Desktop 15: SP4
SUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
MozillaFirefox-translations-other: before 102.11.0-150200.152.87.1
MozillaFirefox-debugsource: before 102.11.0-150200.152.87.1
MozillaFirefox-devel: before 102.11.0-150200.152.87.1
MozillaFirefox: before 102.11.0-150200.152.87.1
MozillaFirefox-translations-common: before 102.11.0-150200.152.87.1
MozillaFirefox-branding-upstream: before 102.11.0-150200.152.87.1
MozillaFirefox-debuginfo: before 102.11.0-150200.152.87.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232173-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75876
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-32207
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform clickjacking attack.
The vulnerability exists due to a missing delay in popup notifications. A remote attacker can trick a victim into granting permissions.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP4
SUSE Linux Enterprise Server 15: SP2 - SP4
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Real Time 15: SP3 - SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP4
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Desktop 15: SP4
SUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
MozillaFirefox-translations-other: before 102.11.0-150200.152.87.1
MozillaFirefox-debugsource: before 102.11.0-150200.152.87.1
MozillaFirefox-devel: before 102.11.0-150200.152.87.1
MozillaFirefox: before 102.11.0-150200.152.87.1
MozillaFirefox-translations-common: before 102.11.0-150200.152.87.1
MozillaFirefox-branding-upstream: before 102.11.0-150200.152.87.1
MozillaFirefox-debuginfo: before 102.11.0-150200.152.87.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232173-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75880
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-32211
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a type confusion error when processing HTML content. A remote attacker can trick the victim to open a specially crafted website, trigger a type confusion error and crash the browser.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP4
SUSE Linux Enterprise Server 15: SP2 - SP4
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Real Time 15: SP3 - SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP4
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Desktop 15: SP4
SUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
MozillaFirefox-translations-other: before 102.11.0-150200.152.87.1
MozillaFirefox-debugsource: before 102.11.0-150200.152.87.1
MozillaFirefox-devel: before 102.11.0-150200.152.87.1
MozillaFirefox: before 102.11.0-150200.152.87.1
MozillaFirefox-translations-common: before 102.11.0-150200.152.87.1
MozillaFirefox-branding-upstream: before 102.11.0-150200.152.87.1
MozillaFirefox-debuginfo: before 102.11.0-150200.152.87.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232173-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75881
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-32212
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data. A remote attacker can spoof the address bar using the datalist element.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP4
SUSE Linux Enterprise Server 15: SP2 - SP4
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Real Time 15: SP3 - SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP4
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Desktop 15: SP4
SUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
MozillaFirefox-translations-other: before 102.11.0-150200.152.87.1
MozillaFirefox-debugsource: before 102.11.0-150200.152.87.1
MozillaFirefox-devel: before 102.11.0-150200.152.87.1
MozillaFirefox: before 102.11.0-150200.152.87.1
MozillaFirefox-translations-common: before 102.11.0-150200.152.87.1
MozillaFirefox-branding-upstream: before 102.11.0-150200.152.87.1
MozillaFirefox-debuginfo: before 102.11.0-150200.152.87.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232173-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75882
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-32213
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within FileReader::DoReadData() when reading a file. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP4
SUSE Linux Enterprise Server 15: SP2 - SP4
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Real Time 15: SP3 - SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP4
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Desktop 15: SP4
SUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
MozillaFirefox-translations-other: before 102.11.0-150200.152.87.1
MozillaFirefox-debugsource: before 102.11.0-150200.152.87.1
MozillaFirefox-devel: before 102.11.0-150200.152.87.1
MozillaFirefox: before 102.11.0-150200.152.87.1
MozillaFirefox-translations-common: before 102.11.0-150200.152.87.1
MozillaFirefox-branding-upstream: before 102.11.0-150200.152.87.1
MozillaFirefox-debuginfo: before 102.11.0-150200.152.87.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232173-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75883
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-32214
CWE-ID:
CWE-939 - Improper Authorization in Handler for Custom URL Scheme
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to crash the browser.
The vulnerability exists due to incorrect processing of the ms-cxh and ms-cxh-full handlers. A remote attacker can trick the victim to visit a specially crafted web page and crash the browser.
Note, the vulnerability affects Windows installations only.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP4
SUSE Linux Enterprise Server 15: SP2 - SP4
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Real Time 15: SP3 - SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP4
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Desktop 15: SP4
SUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
MozillaFirefox-translations-other: before 102.11.0-150200.152.87.1
MozillaFirefox-debugsource: before 102.11.0-150200.152.87.1
MozillaFirefox-devel: before 102.11.0-150200.152.87.1
MozillaFirefox: before 102.11.0-150200.152.87.1
MozillaFirefox-translations-common: before 102.11.0-150200.152.87.1
MozillaFirefox-branding-upstream: before 102.11.0-150200.152.87.1
MozillaFirefox-debuginfo: before 102.11.0-150200.152.87.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232173-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75884
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-32215
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can trick the victim to open a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP4
SUSE Linux Enterprise Server 15: SP2 - SP4
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Real Time 15: SP3 - SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP4
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Desktop 15: SP4
SUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
MozillaFirefox-translations-other: before 102.11.0-150200.152.87.1
MozillaFirefox-debugsource: before 102.11.0-150200.152.87.1
MozillaFirefox-devel: before 102.11.0-150200.152.87.1
MozillaFirefox: before 102.11.0-150200.152.87.1
MozillaFirefox-translations-common: before 102.11.0-150200.152.87.1
MozillaFirefox-branding-upstream: before 102.11.0-150200.152.87.1
MozillaFirefox-debuginfo: before 102.11.0-150200.152.87.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232173-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.