SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Network Security Services (NSS) Vendors:   Mozilla.org
(CentOS Issues Fix for Network Security Services (NSS)) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Spoof the Address Bar, Overwrite Files, and Deny Service
SecurityTracker Alert ID:  1035684
SecurityTracker URL:  http://securitytracker.com/id/1035684
CVE Reference:   CVE-2016-1979   (Links to External Site)
Date:  Apr 26 2016
Impact:   Denial of service via network, Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can cause denial of service conditions on the target system. A remote user can modify files on the target system. A remote user can bypass same-origin restrictions on the target system. A remote user can spoof the address bar. Network Security Services (NSS) is affected.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system [CVE-2016-1952, CVE-2016-1953].

A remote user can create specially crafted HTML that, when loaded by the target user, will overwrite files on the target user's system with a Content Security Policy (CSP) violation report [CVE-2016-1954].

A remote user may be able to obtain full path information for cross-origin iframe navigations in a CSP violatin report [CVE-2016-1955].

A remote user can create content that, when loaded by the target user, will perform certain WebGL operations in a canvas to consume excessive memory resources on the target user's system [CVE-2016-1956]. Certain Intel drivers on Linux are affected.

A remote user can create a specially crafted MPEG4 video file that, when loaded by the target user, will trigger a memory leak in the libstagefright library [CVE-2016-1957].

A remote user can spoof the address bar URL [CVE-2016-1958].

A remote user can trigger a flaw in the Clients API in Service Workers to cause an out-of-bounds read in ServiceWorkerManager and potentially execute arbitrary code [CVE-2016-1959].

A remote user can trigger a use-after-free memory error in the HTML5 string parser and potentially execute arbitrary code [CVE-2016-1960].

A remote user can trigger a use-after-free memory error in the SetBody function of HTMLDocument and potentially execute arbitrary code [CVE-2016-1961].

A remote user can trigger a use-after-free memory error when using multiple WebRTC data channel connections and potentially execute arbitrary code [CVE-2016-1962].

A local user can modify a file being read by FileReader to potentially execute arbitrary code [CVE-2016-1963].

A remote user can trigger a use-after-free memory error during XML transformation operations and potentially execute arbitrary code [CVE-2016-1964].

A remote user can spoof the address bar using location.protocol and history.back [CVE-2016-1965].

A remote user may be able to read cross-origin URLs [CVE-2016-1967].

A remote user can trigger a buffer overflow in the Brotli library and potentially execute arbitrary code [CVE-2016-1968].

A remote user can trigger a pointer dereference in the Netscape Plugin Application Programming Interface (NPAPI) plug-in and potentially execute arbitrary code [CVE-2016-1966].

A remote user can trigger memory errors in WebRTC and potentially execute arbitrary code [CVE-2016-1970, CVE-2016-1971, CVE-2016-1975, CVE-2016-1976, CVE-2016-1972].

A remote user can trigger a race condition in WebRTC in GetStaticInstance() and potentially execute arbitrary code [CVE-2016-1973].

A remote user can trigger an out-of-bounds memory read error in parsing unicode strings and potentially execute arbitrary code [CVE-2016-1974].

A remote user can create a specially crafted ASN.1 encoded certificate that, when parsed by the Network Security Services (NSS) library, will trigger a heap overflow and potentially execute arbitrary code [CVE-2016-1950].

A remote user can trigger a use-after-free memory error in the NSS libraries when processing DER-encoded keys [CVE-2016-1979].

A remote user can create a specially crafted graphite font that, when loaded by the target user, will trigger a stack corruption, uninitialized memory, out-of-bounds read, or out-of-bounds write error and potentially execute arbitrary code [CVE-2016-1969, CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802].

Bob Clary, Christoph Diehl, Christian Holler, Andrew McCreight, Daniel Holbert, Jesse Ruderman, Randell Jesup, Carsten Book, Gian-Carlo Pascutto, Tyson Smith, Andrea Marchesini, Jukka Jylanki, Nicolas Golubovic, Muneaki Nishimura (nishimunea) of Recruit Technologies Co.,Ltd., Ucha Gobejishvili, Jose Martinez, Romina Santillan,
Abdulrahman Alqabandi, Looben Yang, ca0nguyen (via HP's Zero Day Initiative), lokihardt (via HP's Zero Day Initiative), Dominique Hazael-Massieux, Oriol, Nicolas Gregoire, Tsubasa Iinuma, Jordi Chancel, Luke Li, the Communications Electronics Security Group (UK) of the GCHQ, Ronald Crane, Francis Gabriel, Tim Taubert, Holger Fuhrmannek, and James Clawson reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can cause denial of service conditions.

A remote user can overwrite files on the target system.

A remote user can bypass same-origin restrictions on the target system.

A remote user can spoof the address bar.

Solution:   CentOS has issued a fix for CVE-2016-1979 for Network Security Services (NSS).

i386:
22a25171db9d8a514be909e7a8eef944e73b3194d6dc51c1e4e351adfb62035e nss-3.21.0-6.el5_11.i386.rpm
28ae63c316cc4f13f29e8cb0dfcf13b004dd591386eeed974b5721adf1b62f5d nss-devel-3.21.0-6.el5_11.i386.rpm
bd69e9a3c779a8fc3a9c5f1d2db5cecc2c30b92fbb7a3d1f65cdc86f4cf04339 nss-pkcs11-devel-3.21.0-6.el5_11.i386.rpm
d70335c291e0b4b34b7e7e4294a284b59d26617edb92d601b2e281c3e48995aa nss-tools-3.21.0-6.el5_11.i386.rpm

x86_64:
22a25171db9d8a514be909e7a8eef944e73b3194d6dc51c1e4e351adfb62035e nss-3.21.0-6.el5_11.i386.rpm
891293a24f0e8664504d9bf777844c333efb8f77d7bed69163857dea240e0425 nss-3.21.0-6.el5_11.x86_64.rpm
28ae63c316cc4f13f29e8cb0dfcf13b004dd591386eeed974b5721adf1b62f5d nss-devel-3.21.0-6.el5_11.i386.rpm
c442280aab2f2064a0ef4b0794ac1f926422eb44a1e8c0759a54f6f0f71e9cce nss-devel-3.21.0-6.el5_11.x86_64.rpm
bd69e9a3c779a8fc3a9c5f1d2db5cecc2c30b92fbb7a3d1f65cdc86f4cf04339 nss-pkcs11-devel-3.21.0-6.el5_11.i386.rpm
f412a80e0611d89981d883653a2bb309afbd20dd825770d45ef0d267e6ee18e7 nss-pkcs11-devel-3.21.0-6.el5_11.x86_64.rpm
ae5698473b4847dc48f6e13ed0747c092487843889f88df8741692076fd6ff25 nss-tools-3.21.0-6.el5_11.x86_64.rpm

Source:
4813046342f6562e761c0d1f6c782de5cebaa62fa06523482498dcd1b2c2e8ea nss-3.21.0-6.el5_11.src.rpm

Cause:   Access control error, Input validation error
Underlying OS:  Linux (CentOS)
Underlying OS Comments:  5

Message History:   This archive entry is a follow-up to the message listed below.
Mar 9 2016 Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Spoof the Address Bar, Overwrite Files, and Deny Service



 Source Message Contents

Subject:  [CentOS-announce] CESA-2016:0684 Moderate CentOS 5 nss Security Update


CentOS Errata and Security Advisory 2016:0684 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0684.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
22a25171db9d8a514be909e7a8eef944e73b3194d6dc51c1e4e351adfb62035e  nss-3.21.0-6.el5_11.i386.rpm
28ae63c316cc4f13f29e8cb0dfcf13b004dd591386eeed974b5721adf1b62f5d  nss-devel-3.21.0-6.el5_11.i386.rpm
bd69e9a3c779a8fc3a9c5f1d2db5cecc2c30b92fbb7a3d1f65cdc86f4cf04339  nss-pkcs11-devel-3.21.0-6.el5_11.i386.rpm
d70335c291e0b4b34b7e7e4294a284b59d26617edb92d601b2e281c3e48995aa  nss-tools-3.21.0-6.el5_11.i386.rpm

x86_64:
22a25171db9d8a514be909e7a8eef944e73b3194d6dc51c1e4e351adfb62035e  nss-3.21.0-6.el5_11.i386.rpm
891293a24f0e8664504d9bf777844c333efb8f77d7bed69163857dea240e0425  nss-3.21.0-6.el5_11.x86_64.rpm
28ae63c316cc4f13f29e8cb0dfcf13b004dd591386eeed974b5721adf1b62f5d  nss-devel-3.21.0-6.el5_11.i386.rpm
c442280aab2f2064a0ef4b0794ac1f926422eb44a1e8c0759a54f6f0f71e9cce  nss-devel-3.21.0-6.el5_11.x86_64.rpm
bd69e9a3c779a8fc3a9c5f1d2db5cecc2c30b92fbb7a3d1f65cdc86f4cf04339  nss-pkcs11-devel-3.21.0-6.el5_11.i386.rpm
f412a80e0611d89981d883653a2bb309afbd20dd825770d45ef0d267e6ee18e7  nss-pkcs11-devel-3.21.0-6.el5_11.x86_64.rpm
ae5698473b4847dc48f6e13ed0747c092487843889f88df8741692076fd6ff25  nss-tools-3.21.0-6.el5_11.x86_64.rpm

Source:
4813046342f6562e761c0d1f6c782de5cebaa62fa06523482498dcd1b2c2e8ea  nss-3.21.0-6.el5_11.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC