SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Sun ONE/iPlanet Web Server Vendors:   Oracle
(Oracle Issues Fix for Oracle iPlanet Web Server) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1035627
SecurityTracker URL:  http://securitytracker.com/id/1035627
CVE Reference:   CVE-2015-7182   (Links to External Site)
Date:  Apr 20 2016
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Oracle iPlanet Web Server 7.0
Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass security controls on the target system. A remote user can obtain potentially sensitive information on the target system. A remote user can conduct cross-site scripting attacks. Oracle iPlanet Web Server is affected.

A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target user's system [CVE-2015-4513, CVE-2015-4514].

A remote user can submit an NTLM request (via HTTP) to determine the hostname and potentially the Windows domain of the target system [CVE-2015-4515]

The Reader View does not properly disable script code in SVG animations in certain cases [CVE-2015-4518]. A remote user can bypass Reader mode security protections to potentially cause arbitrary scripting code to be executed by the target user's browser. The code will originate from an arbitrary site and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

On Firefox for Android, the system may not restore the address bar when exiting fullscreen mode. A remote user may be able to exploit this to spoof the addressbar [CVE-2015-7185].

On Firefox for Android, an application may be able to invoke "file://" URIs to download additional files or open cached profile data [CVE-2015-7186].

When a panel is created using the Add-on SDK in a browser extension with the "script: false" setting, the system may not disable the execution of inline script [CVE-2015-7187].

A user can append white-space characters to hostnames that are IP addresses to bypass same-origin policy and potentially conduct cross-site scripting attacks [CVE-2015-7188].

A remote user can trigger a buffer overflow in the JPEGEncoder function during script interactions with a canvas element and potentially execute arbitrary code [CVE-2015-7189].

On Firefox for Android, a remote user may be able to exploit a flaw in the Search feature to load a URL with system privileges and read arbitrary files on the target system [CVE-2015-7190].

On Firefox for Android, a remote user can exploit Android intents and fallback navigation to conduct cross-site scripting attacks [CVE-2015-7191].

On OS X systems, a remote user may be able to trigger an error when an accessibility tool requests the index of a table row through the NSAccessibilityIndexAttribute value and execute arbitrary code [CVE-2015-7192].

A remote user can trigger an error in the processing of cross-origin resource sharing (CORS) "preflight" requests to bypass same-origin policy [CVE-2015-7193].

A remote user can create a specially crafted ZIP file that, when processed by the target user, will trigger a buffer underflow in libjar (libxul) and potentially execute arbitrary code [CVE-2015-7194].

A remote user may be able to create a URL with certain escaped characters in the hostname to trigger a parsing error and potentially access site-specific tokens [CVE-2015-7195].

A remote user can cause the Java plugin to deallocate a JavaScript wrapper when it is still in use, leading to a JavaScript garbage collection crash and potentially to code execution [CVE-2015-7196]. Systems with Java installed an enabled as a browser plugin are affected.

Some flaws exist in the ANGLE graphics library, in SVG rendering, and in cryptographic key manipulation that could potentially execute arbitrary code [CVE-2015-7198, CVE-2015-7199, CVE-2015-7200]. A method to trigger these flaws has not been identified.

A web worker can bypass mixed content policy for WebSockets when workers are used to create WebSockets [CVE-2015-7197].

A remote user can trigger a buffer overflow in the ASN.1 decoder in Network Security Services (NSS) to execute arbitrary code [CVE-2015-7181, CVE-2015-7182, CVE-2015-7183].

Christian Holler, David Major, Jesse Ruderman, Tyson Smith, Boris Zbarsky, Randell Jesup, Olli Pettay, Karl Tomlinson, Jeff Walden, Gary Kwong, Andrew McCreight, Georg Fritzsche, Tyson Smith, Carsten Book, Tim Brown, Mario Heiderich, Frederik Braun,
Jordi Chancel, Jason Hamilton and Peter Arremann with AMO editor Sylvain Giroux, Michal Bentkowski, Looben Yang, Muneaki Nishimura, Frederic Wang, Shinto K Anto,
Gustavo Grieco, Frans Rosen, Vytautas Staraitis, Ronald Crane, Ehsan Akhgari, David Keeler, and Ryan Sleevi reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can bypass security controls on the target system.

A remote user can obtain potentially sensitive information on the target system.

A remote user can access the target user's cookies (including authentication cookies), if any, associated with an arbitrary site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Solution:   Oracle has issued a fix for CVE-2015-7182 for Oracle iPlanet Web Server as part of the April 2016 Oracle Critical Patch Update.

The Oracle advisory is available at:

http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

Vendor URL:  www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, State error
Underlying OS:  Linux (Any), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Nov 5 2015 Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC