{"api_version":"1","generated_at":"2026-04-23T01:31:46+00:00","cve":"CVE-2019-9793","urls":{"html":"https://cve.report/CVE-2019-9793","api":"https://cve.report/api/cve/CVE-2019-9793.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-9793","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-9793"},"summary":{"title":"CVE-2019-9793","description":"A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.","state":"PUBLIC","assigner":"security@mozilla.org","published_at":"2019-04-26 17:29:00","updated_at":"2019-05-13 10:29:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"https://www.mozilla.org/security/advisories/mfsa2019-07/","name":"https://www.mozilla.org/security/advisories/mfsa2019-07/","refsource":"MISC","tags":["Vendor Advisory"],"title":"Security vulnerabilities fixed in Firefox 66 — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:0966","name":"RHSA-2019:0966","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1528829","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1528829","refsource":"MISC","tags":["Issue Tracking","Permissions Required","Vendor Advisory"],"title":"Access Denied","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.mozilla.org/security/advisories/mfsa2019-08/","name":"https://www.mozilla.org/security/advisories/mfsa2019-08/","refsource":"MISC","tags":["Vendor Advisory"],"title":"Security vulnerabilities fixed in Firefox ESR 60.6 — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.mozilla.org/security/advisories/mfsa2019-11/","name":"https://www.mozilla.org/security/advisories/mfsa2019-11/","refsource":"MISC","tags":["Vendor Advisory"],"title":"Security vulnerabilities fixed in Thunderbird 60.6 — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:1144","name":"RHSA-2019:1144","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-9793","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9793","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"9793","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"9793","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"9793","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"9793","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"9793","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"9793","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2019-9793","qid":"371855","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for mozilla Multiple Vulnerabilities (05da6b56-3e66-4306-9ea3-89fafe939726)"},{"cve":"CVE-2019-9793","qid":"500915","title":"Alpine Linux Security Update for firefox-esr"},{"cve":"CVE-2019-9793","qid":"504780","title":"Alpine Linux Security Update for firefox-esr"},{"cve":"CVE-2019-9793","qid":"673432","title":"EulerOS Security Update for mozjs60 (EulerOS-SA-2024-1201)"},{"cve":"CVE-2019-9793","qid":"673812","title":"EulerOS Security Update for mozjs60 (EulerOS-SA-2024-1181)"},{"cve":"CVE-2019-9793","qid":"710177","title":"Gentoo Linux Mozilla Thunderbird and Firefox Multiple vulnerabilities (GLSA 201904-07)"}]},"source_records":{"cve_program":{"data_version":"4.0","references":{"reference_data":[{"url":"https://www.mozilla.org/security/advisories/mfsa2019-07/","refsource":"MISC","name":"https://www.mozilla.org/security/advisories/mfsa2019-07/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2019-08/","refsource":"MISC","name":"https://www.mozilla.org/security/advisories/mfsa2019-08/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2019-11/","refsource":"MISC","name":"https://www.mozilla.org/security/advisories/mfsa2019-11/"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1528829","refsource":"MISC","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1528829"},{"refsource":"REDHAT","name":"RHSA-2019:0966","url":"https://access.redhat.com/errata/RHSA-2019:0966"},{"refsource":"REDHAT","name":"RHSA-2019:1144","url":"https://access.redhat.com/errata/RHSA-2019:1144"}]},"description":{"description_data":[{"lang":"eng","value":"A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66."}]},"data_type":"CVE","affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"version":{"version_data":[{"version_affected":"<","version_value":"60.6"}]},"product_name":"Thunderbird"},{"version":{"version_data":[{"version_affected":"<","version_value":"60.6"}]},"product_name":"Firefox ESR"},{"version":{"version_data":[{"version_affected":"<","version_value":"66"}]},"product_name":"Firefox"}]},"vendor_name":"Mozilla"}]}},"CVE_data_meta":{"ID":"CVE-2019-9793","ASSIGNER":"security@mozilla.org","STATE":"PUBLIC"},"data_format":"MITRE","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Improper bounds checks when Spectre mitigations are disabled"}]}]}},"nvd":{"publishedDate":"2019-04-26 17:29:00","lastModifiedDate":"2019-05-13 10:29:00","problem_types":["CWE-119"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","versionEndExcluding":"66.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","versionEndExcluding":"60.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","versionEndExcluding":"60.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"9793","Ordinal":"147672","Title":"CVE-2019-9793","CVE":"CVE-2019-9793","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"9793","Ordinal":"1","NoteData":"A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"9793","Ordinal":"2","NoteData":"2019-04-26","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"9793","Ordinal":"3","NoteData":"2019-05-13","Type":"Other","Title":"Modified"}]}}}