SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Mozilla Firefox Vendors:   Mozilla.org
Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
SecurityTracker Alert ID:  1028162
SecurityTracker URL:  http://securitytracker.com/id/1028162
CVE Reference:   CVE-2013-0765, CVE-2013-0772, CVE-2013-0773, CVE-2013-0774, CVE-2013-0775, CVE-2013-0776, CVE-2013-0777, CVE-2013-0778, CVE-2013-0779, CVE-2013-0780, CVE-2013-0781, CVE-2013-0782, CVE-2013-0783, CVE-2013-0784   (Links to External Site)
Date:  Feb 20 2013
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 19.0
Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially sensitive information.

A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system [CVE-2013-0783, CVE-2013-0784, CVE-2013-0775, CVE-2013-0777, CVE-2013-0778, CVE-2013-0779, CVE-2013-0780, CVE-2013-0781, CVE-2013-0782]. The code will run with the privileges of the target user.

A remote user can trigger an out-of-bounds read in mozilla::image::RasterImage::DrawFrameTo() when rendering GIF images to potentially access potentially sensitive data that is ostensibly inaccesible [CVE-2013-0772].

A remote user can wrap a WebIDL object multiple times to overwrite the existing wrapped state and potentially execute arbitrary code [CVE-2013-0765].

A remote user can bypass some protections in Chrome Object Wrappers (COW) and System Only Wrappers (SOW) to obtain information from chrome objects and possibly execute arbitrary code [CVE-2013-0773].

A remote user can determine the file system location of the active browser profile [CVE-2013-0774].

A remote proxy server can return a 407 response. When the user cancels the proxy's authentication prompt, the addressbar will continue to show the requested HTTPS URL [CVE-2013-0776].

The following researchers reported these vulnerabilities:

Olli Pettay, Christoph Diehl, Gary Kwong, Jesse Ruderman, Andrew McCreight, Joe Drew, Wayne Mery, Alon Zakai, Christian Holler, Luke Wagner, Terrence Cole, Timothy Nikkel, Bill McCloskey, Nicolas Pierron, Atte Kettunen from OUSPG, Boris Zbarsky, Bobby Holley, Frederik Braun, Nils, Michal Zalewski of Google, and Abhishek Arya (Inferno) of the Google Chrome Security Team.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can obtain potentially sensitive information.

Solution:   The vendor has issued a fix (19.0; ESR 17.0.3).

The vendor's advisories are available at:

http://www.mozilla.org/security/announce/2013/mfsa2013-21.html
http://www.mozilla.org/security/announce/2013/mfsa2013-22.html
http://www.mozilla.org/security/announce/2013/mfsa2013-23.html
http://www.mozilla.org/security/announce/2013/mfsa2013-24.html
http://www.mozilla.org/security/announce/2013/mfsa2013-25.html
http://www.mozilla.org/security/announce/2013/mfsa2013-26.html
http://www.mozilla.org/security/announce/2013/mfsa2013-27.html
http://www.mozilla.org/security/announce/2013/mfsa2013-28.html

Vendor URL:  www.mozilla.org/security/announce/2013/mfsa2013-21.html (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Feb 20 2013 (Red Hat Issues Fix) Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC