SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Web Browser)  >   Mozilla Firefox Vendors:   Mozilla.org
Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1034069
SecurityTracker URL:  http://securitytracker.com/id/1034069
CVE Reference:   CVE-2015-4513, CVE-2015-4514, CVE-2015-4515, CVE-2015-4518, CVE-2015-7181, CVE-2015-7182, CVE-2015-7183, CVE-2015-7185, CVE-2015-7186, CVE-2015-7187, CVE-2015-7188, CVE-2015-7189, CVE-2015-7190, CVE-2015-7191, CVE-2015-7192, CVE-2015-7193, CVE-2015-7194, CVE-2015-7195, CVE-2015-7196, CVE-2015-7197, CVE-2015-7198, CVE-2015-7199, CVE-2015-7200   (Links to External Site)
Date:  Nov 5 2015
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 42.0
Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass security controls on the target system. A remote user can obtain potentially sensitive information on the target system. A remote user can conduct cross-site scripting attacks.

A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target user's system [CVE-2015-4513, CVE-2015-4514].

A remote user can submit an NTLM request (via HTTP) to determine the hostname and potentially the Windows domain of the target system [CVE-2015-4515]

The Reader View does not properly disable script code in SVG animations in certain cases [CVE-2015-4518]. A remote user can bypass Reader mode security protections to potentially cause arbitrary scripting code to be executed by the target user's browser. The code will originate from an arbitrary site and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

On Firefox for Android, the system may not restore the address bar when exiting fullscreen mode. A remote user may be able to exploit this to spoof the addressbar [CVE-2015-7185].

On Firefox for Android, an application may be able to invoke "file://" URIs to download additional files or open cached profile data [CVE-2015-7186].

When a panel is created using the Add-on SDK in a browser extension with the "script: false" setting, the system may not disable the execution of inline script [CVE-2015-7187].

A user can append white-space characters to hostnames that are IP addresses to bypass same-origin policy and potentially conduct cross-site scripting attacks [CVE-2015-7188].

A remote user can trigger a buffer overflow in the JPEGEncoder function during script interactions with a canvas element and potentially execute arbitrary code [CVE-2015-7189].

On Firefox for Android, a remote user may be able to exploit a flaw in the Search feature to load a URL with system privileges and read arbitrary files on the target system [CVE-2015-7190].

On Firefox for Android, a remote user can exploit Android intents and fallback navigation to conduct cross-site scripting attacks [CVE-2015-7191].

On OS X systems, a remote user may be able to trigger an error when an accessibility tool requests the index of a table row through the NSAccessibilityIndexAttribute value and execute arbitrary code [CVE-2015-7192].

A remote user can trigger an error in the processing of cross-origin resource sharing (CORS) "preflight" requests to bypass same-origin policy [CVE-2015-7193].

A remote user can create a specially crafted ZIP file that, when processed by the target user, will trigger a buffer underflow in libjar (libxul) and potentially execute arbitrary code [CVE-2015-7194].

A remote user may be able to create a URL with certain escaped characters in the hostname to trigger a parsing error and potentially access site-specific tokens [CVE-2015-7195].

A remote user can cause the Java plugin to deallocate a JavaScript wrapper when it is still in use, leading to a JavaScript garbage collection crash and potentially to code execution [CVE-2015-7196]. Systems with Java installed an enabled as a browser plugin are affected.

Some flaws exist in the ANGLE graphics library, in SVG rendering, and in cryptographic key manipulation that could potentially execute arbitrary code [CVE-2015-7198, CVE-2015-7199, CVE-2015-7200]. A method to trigger these flaws has not been identified.

A web worker can bypass mixed content policy for WebSockets when workers are used to create WebSockets [CVE-2015-7197].

A remote user can trigger a buffer overflow in the ASN.1 decoder in Network Security Services (NSS) to execute arbitrary code [CVE-2015-7181, CVE-2015-7182, CVE-2015-7183].

Christian Holler, David Major, Jesse Ruderman, Tyson Smith, Boris Zbarsky, Randell Jesup, Olli Pettay, Karl Tomlinson, Jeff Walden, Gary Kwong, Andrew McCreight, Georg Fritzsche, Tyson Smith, Carsten Book, Tim Brown, Mario Heiderich, Frederik Braun,
Jordi Chancel, Jason Hamilton and Peter Arremann with AMO editor Sylvain Giroux, Michal Bentkowski, Looben Yang, Muneaki Nishimura, Frederic Wang, Shinto K Anto,
Gustavo Grieco, Frans Rosen, Vytautas Staraitis, Ronald Crane, Ehsan Akhgari, David Keeler, and Ryan Sleevi reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can bypass security controls on the target system.

A remote user can obtain potentially sensitive information on the target system.

A remote user can access the target user's cookies (including authentication cookies), if any, associated with an arbitrary site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Solution:   The vendor has issued a fix (ESR 38.4; 42.0).

The vendor's advisories are available at:

https://www.mozilla.org/en-US/security/advisories/mfsa2015-116/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-117/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-118/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-119/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-120/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-121/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-122/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-123/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-124/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-125/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-126/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-127/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-128/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-129/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-130/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-131/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-132/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-133/

Vendor URL:  www.mozilla.org/en-US/security/advisories/mfsa2015-116/ (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, State error
Underlying OS:  Android, Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Nov 5 2015 (Ubuntu Issues Fix) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Ubuntu has issued a fix for Ubuntu Linux 12.04 LTS, 14.04 LTS, 14.10, and 15.04.
Nov 5 2015 (Red Hat Issues Fix) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Red Hat has issued a fix for Red Hat Enterprise Linux 5, 6, and 7.
Nov 5 2015 (Red Hat Issues Fix for Network Security Services (NSS)) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Red Hat has issued a fix for Network Security Services (NSS) for Red Hat Enterprise Linux 5, 6, 6.2, 6.4, 6.5, 6.6, and 7.
Nov 5 2015 (Red Hat Issues Fix for Netscape Portable Runtime Library) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Red Hat has issued a fix for Netscape Portable Runtime Library for Red Hat Enterprise Linux 5, 6, 6.2, 6.4, 6.5, 6.6, and 7.
Nov 5 2015 (Ubuntu Issues Fix for Network Security Services (NSS)) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Ubuntu has issued a fix for Network Security Services (NSS) for Ubuntu Linux 12.04 LTS, 14.04 LTS, 14.10, and 15.04.
Nov 5 2015 (Oracle Issues Fix for Oracle Linux) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Oracle has issued a fix for Oracle Linux 5, 6, and 7.
Nov 5 2015 (CentOS Issues Fix) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
CentOS has issued a fix for CentOS Linux 5, 6, and 7.
Nov 5 2015 (Oracle Issues Fix for Oracle Linux for Netscape Portable Runtime Library) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Oracle has issued a fix for Netscape Portable Runtime Library for Oracle Linux 6 and 7.
Nov 5 2015 (Oracle Issues Fix for Oracle Linux for Network Security Services (NSS)) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Oracle has issued a fix for Network Security Services (NSS) for Oracle Linux 6 and 7.
Nov 5 2015 (CentOS Issues Fix for Network Security Services (NSS)) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
CentOS has issued a fix for Network Security Services (NSS) for CentOS Linux 5, 6, and 7.
Nov 5 2015 (CentOS Issues Fix for Netscape Portable Runtime Library) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
CentOS has issued a fix for Netscape Portable Runtime Library for CentOS Linux 5, 6, and 7.
Nov 26 2015 (Red Hat Issues Fix for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Red Hat has issued a fix for Mozilla Thunderbird for Red Hat Enterprise Linux 6 and 7.
Nov 27 2015 (CentOS Issues Fix for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
CentOS has issued a fix for Mozilla Thunderbird for CentOS Linux 5 and 6.
Nov 27 2015 (Oracle Issues Fix for Oracle Linux for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Oracle has issued a fix for Mozilla Thunderbird for Oracle Linux 6 and 7.
Dec 9 2015 (Red Hat Issues Fix) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Red Hat has issued a fix for Red Hat Enterprise Linux 6.2, 6.4, 6.5, and 6.6.
Jan 20 2016 (Oracle Issues Fix for Oracle VM VirtualBox) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Oracle has issued a fix for Oracle VM VirtualBox.
Apr 20 2016 (Oracle Issues Fix for Oracle Traffic Director) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Oracle has issued a fix for Oracle Traffic Director.
Apr 20 2016 (Oracle Issues Fix for Oracle OpenSSO) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Oracle has issued a fix for Oracle Fusion Middleware/Oracle OpenSSO.
Apr 20 2016 (Oracle Issues Fix for Sun GlassFish Enterprise Server) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Oracle has issued a fix for Sun GlassFish Enterprise Server.
Apr 20 2016 (Oracle Issues Fix for Oracle iPlanet Web Proxy Server) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Oracle has issued a fix for Oracle iPlanet Web Proxy Server.
Apr 20 2016 (Oracle Issues Fix for Oracle iPlanet Web Server) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Oracle has issued a fix for Oracle iPlanet Web Server.
Jul 19 2016 (Oracle Issues Fix for Oracle Directory Server Enterprise) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
Oracle has issued a fix for Oracle Directory Server Enterprise.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC