SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Mozilla Firefox Vendors:   Mozilla.org
(Ubuntu Issues Fix) Mozilla Firefox Multiple Bugs Let Remote Users Spoof the Address Bar, Bypass Security Restrictions, and Execute Arbitrary Code
SecurityTracker Alert ID:  1041612
SecurityTracker URL:  http://securitytracker.com/id/1041612
CVE Reference:   CVE-2018-12375, CVE-2018-12376, CVE-2018-12377, CVE-2018-12378, CVE-2018-12383   (Links to External Site)
Date:  Sep 7 2018
Impact:   Execution of arbitrary code via network, Modification of system information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass security controls on the target system. A remote user can spoof the address bar.

A remote user can use a 'javascript:' URI with JavaScript to insert text before the domain name to spoof the address bar [CVE-2018-12382]. Firefox for Android is affected.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A use-after-free memory error may occur in certain cases when refresh driver timers are refreshed [CVE-2018-12377].

A use-after-free memory error may occur when an IndexedDB index is deleted while still in use [CVE-2018-12378].

An out-of-bounds memory write error may occur when the Mozilla Updater opens a MAR format file that contains a very long item filename [CVE-2018-12379].

When the automount feature with autofs is used to create a mount point on the local file system, content can be loaded from this file system using a 'file:' URI without being processed via the proxy settings [CVE-2017-16541]. macOS is affected. Linux-based systems with autofs installed are also affected.

When the target user drags and drops an Outlook email message into the browser, a page navigation may occur [CVE-2018-12381]. Windows-based systems with Outlook installed are affected.

When a master password is set after version 58.0, unencrypted passwords are not deleted [CVE-2018-12383].

Other memory safety errors may occur [CVE-2018-12375, CVE-2018-12376].

Alex Gaynor, Andrei Cristian Petcu, Bogdan Tara, Boris Zbarsky, Christian Holler, Christoph Diehl, Filippo Cavallarin, Gary Kwong, Holger Fuhrmannek, Jana Squires, Jason Kratzer, Jed Davis, Jesse Ruderman, Jordi Chancel, Jurgen Gaeremyn, Karl Tomlinson, Looben Yang, Mats Palmgren, Nicolas Grunbaum, Nika Layzell, Nils, Sebastian Hengst, Ted Campbell, Tyson Smith, and Zhanjia Song reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can bypass security controls on the target system.

A remote user can spoof the address bar.

Solution:   Ubuntu has issued a fix for CVE-2018-12375, CVE-2018-12376, CVE-2018-12377, CVE-2018-12378, and CVE-2018-12383.

The Ubuntu advisory is available at:

https://usn.ubuntu.com/usn/usn-3761-1

Vendor URL:  usn.ubuntu.com/usn/usn-3761-1 (Links to External Site)
Cause:   Access control error, Input validation error, State error
Underlying OS:  Linux (Ubuntu)
Underlying OS Comments:  14.04 LTS, 16.04 LTS, 18.04 LTS

Message History:   This archive entry is a follow-up to the message listed below.
Sep 7 2018 Mozilla Firefox Multiple Bugs Let Remote Users Spoof the Address Bar, Bypass Security Restrictions, and Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC