SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Mozilla Firefox Vendors:   Mozilla.org
Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Same-Origin Policy, and Cause Denial of Service Conditions
SecurityTracker Alert ID:  1034426
SecurityTracker URL:  http://securitytracker.com/id/1034426
CVE Reference:   CVE-2015-7201, CVE-2015-7202, CVE-2015-7203, CVE-2015-7204, CVE-2015-7205, CVE-2015-7207, CVE-2015-7208, CVE-2015-7210, CVE-2015-7211, CVE-2015-7212, CVE-2015-7213, CVE-2015-7214, CVE-2015-7215, CVE-2015-7216, CVE-2015-7217, CVE-2015-7218, CVE-2015-7219, CVE-2015-7220, CVE-2015-7221, CVE-2015-7222, CVE-2015-7223   (Links to External Site)
Date:  Dec 16 2015
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 43.0
Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can gain elevated privileges. A remote user can bypass cross-origin policy. A remote user can obtain potentially sensitive information on the target system. A remote user can cause denial of service conditions.

A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target user's system [CVE-2015-7201, CVE-2015-7202].

A remote user can create specially crafted Javascript that, when loaded by the target user, will trigger an error and potentially execute arbitrary code [CVE-2015-7204].

A remote user can exploit a flaw when a redirect is followed and a redirect is used via perfomance.getEntries() to view content from the target user's browser cache [CVE-2015-7207].

A remote server can set an ASCII control character (i.e., vertical tab) in a cookie, which may adversely affect some servers [CVE-2015-7208].

A remote user can exploit a timing bug in WebFTC to trigger a use-after-free memory error in WebRTC and potentially execute arbitrary code [CVE-2015-7210].

A remote user can trigger an integer overflow in mozilla::layers::BufferTextureClient::AllocateForSurface() to potentially execute arbitrary code [CVE-2015-7212].

A remote user can trigger a flaw in the processing of error events in Web Workers to bypass same-origin policy and obtain potentially sensitive information [CVE-2015-7215].

A remote user can create a specially crafted data: URI that, when loaded by the target user, will display a different URI [CVE-2015-7211].

A remote user can send a specially crafted HTTP2 header to trigger an integer underflow and cause denial of service condtions [CVE-2015-7218, CVE-2015-7219].

The browser uses a vulnerable library (Jasper) that is no longer maintained [CVE-2015-7216]. Linux systems running Gnome are affected.

A remote user can create a specially crafted TGA file that, when loaded by the target user, will trigger a heap overflow in gdk-pixbuf and cause denial of service conditions [CVE-2015-7217].

A remote user can trigger a buffer overflow in DirectWriteFontInfo::LoadFontFamilyData() to execute arbitrary code on the target user's system [CVE-2015-7203].

A remote user can trigger a buffer overflow in XDRBuffer::grow() to execute arbitrary code on the target user's system [CVE-2015-7220].

A remote user can trigger a buffer overflow in nsDeque::GrowCapacity() to execute arbitrary code on the target user's system [CVE-2015-7221].

A remote user may be able to trigger an integer underflow in RTPReceiverVideo::ParseRtpPacket() and potentially execute arbitrary code or obtain sensitive information [CVE-2015-7205].

A remote user can create a specially crafted MP4 format file that, when loaded by the target user, will trigger a buffer overflow and execute arbitrary code [CVE-2015-7213].

A remote user can create a specially crafted MP4 format file that, when loaded by the target user, will trigger an integer underflow in 'covr' and execute arbitrary code [CVE-2015-7222].

A remote user can exploit a flaw in WebExtension APIs to execute code with the privileges of a certain WebExtension to obtain potentially sensitive information or conduct cross-site scripting attacks [CVE-2015-7223].

A remote user can bypass cross-origin restrictions using data: and view-source: uri schemes and read data from URLs in other domains and from local files [CVE-2015-7214].

Andrei Vaida, Jesse Ruderman, Bob Clary, Christian Holler, Eric Rahm, Robert Kaiser, Harald Kirschner, Michael Henretty, Cajus Pollmeier, cgvwzq, musicDespiteEverything, Looben Yang, Abhishek Arya (Inferno) of the Google Chrome Security Team, Masato Kinugawa, Stuart Larsen, Abdulrahman Alqabandi, Gustavo Grieco, Ronald Crane, Kris Maglione, Joshua Drake, Grieco, and Tsubasa Iinuma reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can gain elevated privileges on the target system.

A remote user can bypass cross-origin restrictions on the target system.

A remote user can obtain potentially sensitive information on the target system.

A remote user can cause denial of service conditions.

Solution:   The vendor has issued a fix (43.0, ESR 38.5).

The vendor's advisories are available at:

https://www.mozilla.org/en-US/security/advisories/mfsa2015-134/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-135/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-136/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-137/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-138/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-139/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-140/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-141/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-142/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-143/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-144/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-145/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-146/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-147/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-148/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-149/

Vendor URL:  www.mozilla.org/en-US/security/advisories/mfsa2015-134/ (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Dec 16 2015 (Ubuntu Issues Fix) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Same-Origin Policy, and Cause Denial of Service Conditions
Ubuntu has issued a fix for Ubuntu Linux 12.04 LTS, 14.04 LTS, 15.04, and 15.10.
Dec 16 2015 (Red Hat Issues Fix) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Same-Origin Policy, and Cause Denial of Service Conditions
Red Hat has issued a fix for Red Hat Enterprise Linux 5, 6, and 7.
Dec 16 2015 (CentOS Issues Fix) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Same-Origin Policy, and Cause Denial of Service Conditions
CentOS has issued a fix for CentOS 7.
Dec 17 2015 (Oracle Issues Fix for Oracle Linux) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Same-Origin Policy, and Cause Denial of Service Conditions
Oracle has issued a fix for Oracle Linux 5, 6, and 7.
Jan 5 2016 (Red Hat Issues Fix for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Same-Origin Policy, and Cause Denial of Service Conditions
Red Hat has issued a fix for Mozilla Thunderbird for Red Hat Enterprise Linux 5, 6, and 7.
Jan 5 2016 (Oracle Issues Fix for Oracle Linux for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Same-Origin Policy, and Cause Denial of Service Conditions
Oracle has issued a fix for Mozilla Thunderbird for Oracle Linux 6 and 7.
Jan 7 2016 (CentOS Issues Fix for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Same-Origin Policy, and Cause Denial of Service Conditions
CentOS has issued a fix for Mozilla Thunderbird CentOS 6.
Jan 7 2016 (CentOS Issues Fix for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Same-Origin Policy, and Cause Denial of Service Conditions
CentOS has issued a fix for Mozilla Thunderbird for CentOS 5.
Jan 7 2016 (CentOS Issues Fix for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Same-Origin Policy, and Cause Denial of Service Conditions
CentOS has issued a fix for Mozilla Thunderbird for CentOS 7.
Jan 14 2016 (Ubuntu Issues Fix for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Same-Origin Policy, and Cause Denial of Service Conditions
Ubuntu has issued a fix for Mozilla Thunderbird for Ubuntu Linux 12.04 LTS, 14.04 LTS, 15.04, and 15.10.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC