SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Mozilla Firefox Vendors:   Mozilla.org
Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code, Deny Service, and Conduct Phishing and Cross-Site Scripting Attacks and Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1028379
SecurityTracker URL:  http://securitytracker.com/id/1028379
CVE Reference:   CVE-2013-0788, CVE-2013-0789, CVE-2013-0790, CVE-2013-0791, CVE-2013-0792, CVE-2013-0793, CVE-2013-0794, CVE-2013-0795, CVE-2013-0796, CVE-2013-0797, CVE-2013-0798, CVE-2013-0799, CVE-2013-0800   (Links to External Site)
Date:  Apr 3 2013
Impact:   Denial of service via network, Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via local system, Execution of arbitrary code via network, Modification of user information, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 20.0
Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A remote user can conduct phishing and cross-site scripting attacks.

A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system [CVE-2013-0788, CVE-2013-0789, CVE-2013-0790]. The code will run with the privileges of the target user.

A remote user can trigger an out-of-bounds write in Cairo graphics library to potentially execute arbitrary code [CVE-2013-0800].

On Windows-based systems, a local user can supply specially crafted values to the Mozilla Maintenance Service to execute arbitrary code on the target system with elevated privileges [CVE-2013-0799].

On Android-based systems, the app_tmp directory is set with world readable and writeable permissions [CVE-2013-0798]. A third party applications may be able to modify Firefox add-ons when downloaded.

A local user can place a specially crafted DLL file on the target system. When the Mozilla Updater is run, the DLL will be executed with elevated privileges [CVE-2013-0797].

On Linux-based systems that have the Intel Mesa graphics drivers, a remote user can trigger a memory error and execute arbitrary code [CVE-2013-0796].

A remote user can bypass System Only Wrappers (SOW) via the cloneNode method and clone a protected node [CVE-2013-0795]. This can be exploited to bypass same origin policy, gain elevated privileges, and execute arbitrary code.

A remote user can remove the origin indication on tab-modal dialog boxes and overlay an arbitrary page with the remote user's dialog box to conduct phishing attacks [CVE-2013-0794].

A remote user can use browser navigations through history to load an arbitrary website with the baseURI property pointing to another site to conduct phishing or cross-site scripting attacks [CVE-2013-0793].

On systems with the 'gfx.color_management.enablev4' preference is enabled, a remote user can obtain potentially sensitive data when grayscale PNG images are rendered [CVE-2013-0792].

A remote user can trigger an out-of-bounds array read in the CERT_DecodeCertPackage() function of the Network Security Services (NSS) library and cause the target application to crash [CVE-2013-0791].

Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic, Joe Drew, Andrew McCreight, Randell Jesup, Gary Kwong, Mats Palmgren, Jim Chen, Abhishek Arya (Inferno) of the Google Chrome Security Team, Frederic Hoguin, Shuichiro Suzuki of the Fourteenforty Research Institute, Ash, miaubiz, Cody Crews, shutdown, Mariusz Mlynski, Tobias Schula, and Ambroz Bizjak reported these vulnerabilities.

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can cause denial of service conditions.

A local user can obtain elevated privileges on the target system.

A remote user can conduct data phishing or cross-site scripting attacks.

Solution:   The vendor has issued a fix (20.0).

The vendor's advisories are available at:

http://www.mozilla.org/security/announce/2013/mfsa2013-30.html
http://www.mozilla.org/security/announce/2013/mfsa2013-31.html
http://www.mozilla.org/security/announce/2013/mfsa2013-32.html
http://www.mozilla.org/security/announce/2013/mfsa2013-33.html
http://www.mozilla.org/security/announce/2013/mfsa2013-34.html
http://www.mozilla.org/security/announce/2013/mfsa2013-35.html
http://www.mozilla.org/security/announce/2013/mfsa2013-36.html
http://www.mozilla.org/security/announce/2013/mfsa2013-37.html
http://www.mozilla.org/security/announce/2013/mfsa2013-38.html
http://www.mozilla.org/security/announce/2013/mfsa2013-39.html
http://www.mozilla.org/security/announce/2013/mfsa2013-40.html

Vendor URL:  www.mozilla.org/security/announce/2013/mfsa2013-30.html (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Apr 3 2013 (Red Hat Issues Fix) Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code, Deny Service, and Conduct Phishing and Cross-Site Scripting Attacks and Let Local Users Gain Elevated Privileges
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC