SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Mozilla Firefox Vendors:   Mozilla.org
Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Gain Elevated Privileges
SecurityTracker Alert ID:  1033640
SecurityTracker URL:  http://securitytracker.com/id/1033640
CVE Reference:   CVE-2015-4476, CVE-2015-4500, CVE-2015-4501, CVE-2015-4502, CVE-2015-4503, CVE-2015-4504, CVE-2015-4505, CVE-2015-4506, CVE-2015-4507, CVE-2015-4508, CVE-2015-4509, CVE-2015-4510, CVE-2015-4511, CVE-2015-4512, CVE-2015-4516, CVE-2015-4517, CVE-2015-4519, CVE-2015-4520, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7178, CVE-2015-7179, CVE-2015-7180, CVE-2015-7327   (Links to External Site)
Updated:  Sep 24 2015
Original Entry Date:  Sep 22 2015
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 41.0
Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A local user can obtain elevated privileges on the target system. A remote user can bypass security controls on the target system. A remote user can obtain potentially sensitive information on the target system. A remote user can spoof URLs.

A remote user can create specially crafted content that, when loaded by the target user, will trigger a buffer overflow, memory corruption error, or use-after-free memory error and execute arbitrary code on the target user's system [CVE-2015-4500, CVE-2015-4501, CVE-2015-4506, CVE-2015-4509, CVE-2015-4510, CVE-2015-4511, CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7178, CVE-2015-7179, CVE-2015-7180].

When the debugger API is used with SavedStacks in JavaScript, an error in getSlotRef(EVAL).isUndefined() may allow for code execution [CVE-2015-4507].

A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory leak in mozTCPSocket and disclose memory contents to the remote user [CVE-2015-4503].

A remote user can create specially crafted content that, when loaded by the target user, will trigger an out-of-bounds memory read error in the lut_inverse_interp16() function in the QCMS color management library when modifying ICC V4 profile attributes and disclose potentially sensitive information to the remote user [CVE-2015-4504].

A remote user can trigger an out-of-bounds memory read error during 2D canvas display rendering on Linux 16-bit color depth systems and obtain potentially sensitive information [CVE-2015-4512].

A remote user can paste a URL with an unknown protocol to cause the URL to be displayed in the address bar but without navigation [CVE-2015-4476]. A remote user may be able to spoof URLs. Firefox for Android is affected.

A remote user can exploit a flaw in reader mode to spoof the URL displayed in the address bar [CVE-2015-4508].

A local user can invoke the Mozilla updater on Windows (updater.exe) to load arbitrary files from a working directory that the local user has access to [CVE-2015-4505]. This can be exploited to execute arbitrary code with elevated privileges. Windows is affected.

A remote user can create a scripted proxy for a window to bypass security restrictions and cause a reference to be passed to an inner window [CVE-2015-4502].

A remote user can create specially crafted JavaScript that, when loaded by the target user, will bypass ECMAScript 5 API immutable property enforcement to potentially execute arbitrary code with elevated privileges [CVE-2015-4516].

When a loaded image is dragged and dropped into content after a URL redirect, the redirected URL is available to scripts [CVE-2015-4519].

A remote user can bypass cross-origin resource sharing (CORS) restrictions in the processing of CORS preflight request headers [CVE-2015-4520].

A remote user can invoke the High Resolution Time API to access and monitor the performance.now() API to extract timing information that can be used in potential side channel attacks [CVE-2015-7327].

Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, and Angelos D. Keromytis of Columbia University's Network Security Lab, Andrew Osmond, Olli Pettay, Andrew Sutherland, Christian Holler, David Major, Andrew McCreight, Cameron McCormack , Bob Clary, Randell Jesup, David Chan, Felix Grobert, Jordi Chancel, Holger Fuhrmannek, Khalil Zhani, Juho Nurminen, Spandan Veggalam, Looben Yang, Atte Kettunen, Francisco Alonso of the NowSecure Research Team, Andre Bargull, Jeff Walden, Mario Gomes, Ehsan Akhgari, Ronald Crane, and Amit Klein reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A local user can obtain elevated privileges on the target system.

A remote user can bypass security controls on the target system.

A remote user can obtain potentially sensitive information on the target system.

A remote user can spoof a URL.

Solution:   The vendor has issued a fix (41.0, ESR 38.3).

The vendor's advisories are available at:

https://www.mozilla.org/en-US/security/advisories/mfsa2015-96/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-97/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-98/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-99/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-100/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-101/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-102/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-103/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-104/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-105/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-106/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-107/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-108/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-109/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-110/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-111/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-112/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-113/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-114/

Vendor URL:  www.mozilla.org/en-US/security/advisories/mfsa2015-96/ (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Sep 22 2015 (Red Hat Issues Fix) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Gain Elevated Privileges
Red Hat has issued a fix for Red Hat Enterprise Linux 5, 6, and 7.
Sep 23 2015 (CentOS Issues Fix) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Gain Elevated Privileges
CentOS has issued a fix for CentOS Linux 5, 6, and 7.
Sep 23 2015 (Ubuntu Issues Fix) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Gain Elevated Privileges
Ubuntu has issued a fix for Ubuntu Linux 12.04 LTS, 14.04 LTS, and 15.04.
Sep 24 2015 (Oracle Issues Fix for Oracle Linux) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Gain Elevated Privileges
Oracle has issued a fix for Oracle Linux 5, 6, and 7.
Oct 1 2015 (Red Hat Issues Fix for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Gain Elevated Privileges
Red Hat has issued a fix for Mozilla Thunderbird for Red Hat Enterprise Linux 5, 6, and 7.
Oct 2 2015 (CentOS Issues Fix for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Gain Elevated Privileges
CentOS has issued a fix for Mozilla Thunderbird for CentOS Linux 5, 6, and 7.
Oct 2 2015 (Oracle Issues Fix for Oracle Linux for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Gain Elevated Privileges
Oracle has issued a fix for Mozilla Thunderbird for Oracle Linux 6 and 7.
Oct 5 2015 (Ubuntu Issues Fix for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Gain Elevated Privileges
Ubuntu has issued a fix for Mozilla Thunderbird for Ubuntu Linux 12.04 LTS, 14.04 LTS, and 15.04.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC