SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Netscape Portable Runtime API Vendors:   Mozilla.org
(CentOS Issues Fix for Netscape Portable Runtime API) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Spoof the Address Bar, Overwrite Files, and Deny Service
SecurityTracker Alert ID:  1035686
SecurityTracker URL:  http://securitytracker.com/id/1035686
CVE Reference:   CVE-2016-1979   (Links to External Site)
Date:  Apr 26 2016
Impact:   Denial of service via network, Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can cause denial of service conditions on the target system. A remote user can modify files on the target system. A remote user can bypass same-origin restrictions on the target system. A remote user can spoof the address bar. Netscape Portable Runtime API is affected.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system [CVE-2016-1952, CVE-2016-1953].

A remote user can create specially crafted HTML that, when loaded by the target user, will overwrite files on the target user's system with a Content Security Policy (CSP) violation report [CVE-2016-1954].

A remote user may be able to obtain full path information for cross-origin iframe navigations in a CSP violatin report [CVE-2016-1955].

A remote user can create content that, when loaded by the target user, will perform certain WebGL operations in a canvas to consume excessive memory resources on the target user's system [CVE-2016-1956]. Certain Intel drivers on Linux are affected.

A remote user can create a specially crafted MPEG4 video file that, when loaded by the target user, will trigger a memory leak in the libstagefright library [CVE-2016-1957].

A remote user can spoof the address bar URL [CVE-2016-1958].

A remote user can trigger a flaw in the Clients API in Service Workers to cause an out-of-bounds read in ServiceWorkerManager and potentially execute arbitrary code [CVE-2016-1959].

A remote user can trigger a use-after-free memory error in the HTML5 string parser and potentially execute arbitrary code [CVE-2016-1960].

A remote user can trigger a use-after-free memory error in the SetBody function of HTMLDocument and potentially execute arbitrary code [CVE-2016-1961].

A remote user can trigger a use-after-free memory error when using multiple WebRTC data channel connections and potentially execute arbitrary code [CVE-2016-1962].

A local user can modify a file being read by FileReader to potentially execute arbitrary code [CVE-2016-1963].

A remote user can trigger a use-after-free memory error during XML transformation operations and potentially execute arbitrary code [CVE-2016-1964].

A remote user can spoof the address bar using location.protocol and history.back [CVE-2016-1965].

A remote user may be able to read cross-origin URLs [CVE-2016-1967].

A remote user can trigger a buffer overflow in the Brotli library and potentially execute arbitrary code [CVE-2016-1968].

A remote user can trigger a pointer dereference in the Netscape Plugin Application Programming Interface (NPAPI) plug-in and potentially execute arbitrary code [CVE-2016-1966].

A remote user can trigger memory errors in WebRTC and potentially execute arbitrary code [CVE-2016-1970, CVE-2016-1971, CVE-2016-1975, CVE-2016-1976, CVE-2016-1972].

A remote user can trigger a race condition in WebRTC in GetStaticInstance() and potentially execute arbitrary code [CVE-2016-1973].

A remote user can trigger an out-of-bounds memory read error in parsing unicode strings and potentially execute arbitrary code [CVE-2016-1974].

A remote user can create a specially crafted ASN.1 encoded certificate that, when parsed by the Network Security Services (NSS) library, will trigger a heap overflow and potentially execute arbitrary code [CVE-2016-1950].

A remote user can trigger a use-after-free memory error in the NSS libraries when processing DER-encoded keys [CVE-2016-1979].

A remote user can create a specially crafted graphite font that, when loaded by the target user, will trigger a stack corruption, uninitialized memory, out-of-bounds read, or out-of-bounds write error and potentially execute arbitrary code [CVE-2016-1969, CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802].

Bob Clary, Christoph Diehl, Christian Holler, Andrew McCreight, Daniel Holbert, Jesse Ruderman, Randell Jesup, Carsten Book, Gian-Carlo Pascutto, Tyson Smith, Andrea Marchesini, Jukka Jylanki, Nicolas Golubovic, Muneaki Nishimura (nishimunea) of Recruit Technologies Co.,Ltd., Ucha Gobejishvili, Jose Martinez, Romina Santillan,
Abdulrahman Alqabandi, Looben Yang, ca0nguyen (via HP's Zero Day Initiative), lokihardt (via HP's Zero Day Initiative), Dominique Hazael-Massieux, Oriol, Nicolas Gregoire, Tsubasa Iinuma, Jordi Chancel, Luke Li, the Communications Electronics Security Group (UK) of the GCHQ, Ronald Crane, Francis Gabriel, Tim Taubert, Holger Fuhrmannek, and James Clawson reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can cause denial of service conditions.

A remote user can overwrite files on the target system.

A remote user can bypass same-origin restrictions on the target system.

A remote user can spoof the address bar.

Solution:   CentOS has issued a fix for CVE-2016-1979 for Netscape Portable Runtime API.

i386:
2542e599e93d78a8b51ee1e9ad58b24edf8d70029defc49f8b032e4b5782c6bf nspr-4.11.0-1.el5_11.i386.rpm
5dedec41a954bc0562095cd6d5c43165056c256a66cf1389df0d8414e7c96105 nspr-devel-4.11.0-1.el5_11.i386.rpm

x86_64:
2542e599e93d78a8b51ee1e9ad58b24edf8d70029defc49f8b032e4b5782c6bf nspr-4.11.0-1.el5_11.i386.rpm
f54f893419cc8223d491056a96e33c327a1a6b3e6585c9d91edcaf227a546dc3 nspr-4.11.0-1.el5_11.x86_64.rpm
5dedec41a954bc0562095cd6d5c43165056c256a66cf1389df0d8414e7c96105 nspr-devel-4.11.0-1.el5_11.i386.rpm
d0bc78381c24c31a38ea4297e6ec8f6b2dceb676fa83be84d07d8213f9b1c441 nspr-devel-4.11.0-1.el5_11.x86_64.rpm

Source:
27c20b9b8a0d828b87cf67ca091669580d1506904edac211c643a8ab5f2fcaa6 nspr-4.11.0-1.el5_11.src.rpm

x86_64:
daf7526f2f1ccc56ec97e57940cde39049a4a111951b01197b2c18b4bc7ec1cb nspr-4.11.0-1.el7_2.i686.rpm
d784f223e384f756a5c594925512c5fd6d46aaad66f85936b51453a0dc2dbd8a nspr-4.11.0-1.el7_2.x86_64.rpm
56037499e8d01dd812e5ff3a2752c9aa108dd45fd816269abae28fd6eaa751b1 nspr-devel-4.11.0-1.el7_2.i686.rpm
5b3fbd8326f1249e287423a753d2b249e4d7281c669943c367a62d6f839dfde5 nspr-devel-4.11.0-1.el7_2.x86_64.rpm

Source:
6520f99cd5afa95d605bcc653f47c828e2fb491a548e057d0c99e91a57a1dac3 nspr-4.11.0-1.el7_2.src.rpm

Cause:   Access control error, Input validation error
Underlying OS:  Linux (CentOS)
Underlying OS Comments:  5, 7

Message History:   This archive entry is a follow-up to the message listed below.
Mar 9 2016 Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Spoof the Address Bar, Overwrite Files, and Deny Service



 Source Message Contents

Subject:  [CentOS-announce] CESA-2016:0684 Moderate CentOS 5 nspr Security Update


CentOS Errata and Security Advisory 2016:0684 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0684.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
2542e599e93d78a8b51ee1e9ad58b24edf8d70029defc49f8b032e4b5782c6bf  nspr-4.11.0-1.el5_11.i386.rpm
5dedec41a954bc0562095cd6d5c43165056c256a66cf1389df0d8414e7c96105  nspr-devel-4.11.0-1.el5_11.i386.rpm

x86_64:
2542e599e93d78a8b51ee1e9ad58b24edf8d70029defc49f8b032e4b5782c6bf  nspr-4.11.0-1.el5_11.i386.rpm
f54f893419cc8223d491056a96e33c327a1a6b3e6585c9d91edcaf227a546dc3  nspr-4.11.0-1.el5_11.x86_64.rpm
5dedec41a954bc0562095cd6d5c43165056c256a66cf1389df0d8414e7c96105  nspr-devel-4.11.0-1.el5_11.i386.rpm
d0bc78381c24c31a38ea4297e6ec8f6b2dceb676fa83be84d07d8213f9b1c441  nspr-devel-4.11.0-1.el5_11.x86_64.rpm

Source:
27c20b9b8a0d828b87cf67ca091669580d1506904edac211c643a8ab5f2fcaa6  nspr-4.11.0-1.el5_11.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC