Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1910-1 | firefox-esr security update |
![]() |
DLA-1926-1 | thunderbird security update |
![]() |
DSA-4516-1 | firefox-esr security update |
![]() |
DSA-4523-1 | thunderbird security update |
![]() |
EUVD-2019-3413 | Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1. |
![]() |
USN-4122-1 | Firefox vulnerabilities |
![]() |
USN-4150-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-04T23:03:32.640Z
Reserved: 2019-05-03T00:00:00
Link: CVE-2019-11743

No data.

Status : Modified
Published: 2019-09-27T18:15:12.037
Modified: 2024-11-21T04:21:42.107
Link: CVE-2019-11743


No data.