ASA-201611-16 log original external raw
[ASA-201611-16] firefox: multiple issues |
---|
Arch Linux Security Advisory ASA-201611-16
==========================================
Severity: Critical
Date : 2016-11-16
CVE-ID : CVE-2016-5289 CVE-2016-5290 CVE-2016-5291 CVE-2016-5292
CVE-2016-5296 CVE-2016-5297 CVE-2016-9063 CVE-2016-9064
CVE-2016-9066 CVE-2016-9067 CVE-2016-9068 CVE-2016-9070
CVE-2016-9071 CVE-2016-9073 CVE-2016-9075 CVE-2016-9076
CVE-2016-9077
Package : firefox
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-72
Summary
=======
The package firefox before version 50.0-1 is vulnerable to multiple
issues including arbitrary code execution, information disclosure,
insufficient validation, privilege escalation, content spoofing, denial
of service, same-origin policy bypass and sandbox escape.
Resolution
==========
Upgrade to 50.0-1.
# pacman -Syu "firefox>=50.0-1"
The problems have been fixed upstream in version 50.0.
Workaround
==========
None.
Description
===========
- CVE-2016-5289 (arbitrary code execution)
Mozilla developers and community members Christian Holler, Andrew
McCreight, Dan Minor, Tyson Smith, Jon Coppeard, Jan-Ivar Bruaroey,
Jesse Ruderman, and Markus Stange reported memory safety bugs present
in Firefox 49. Some of these bugs showed evidence of memory corruption
and we presume that with enough effort that some of these could be
exploited to run arbitrary code.
- CVE-2016-5290 (arbitrary code execution)
Mozilla developers and community members Olli Pettay, Christian Holler,
Ehsan Akhgari, Jon Coppeard, Gary Kwong, Tooru Fujisawa, Philipp, and
Randell Jesup reported memory safety bugs present in Firefox 49 and
Firefox ESR 45.4. Some of these bugs showed evidence of memory
corruption and we presume that with enough effort that some of these
could be exploited to run arbitrary code.
- CVE-2016-5291 (same-origin policy bypass)
A same-origin policy bypass with local shortcut files to load arbitrary
local content from disk.
- CVE-2016-5292 (arbitrary code execution)
During URL parsing, a maliciously crafted URL can cause a potentially
exploitable crash.
- CVE-2016-5296 (arbitrary code execution)
A heap-buffer-overflow in Cairo when processing SVG content caused by
compiler optimization, resulting in a potentially exploitable crash.
- CVE-2016-5297 (arbitrary code execution)
An error in argument length checking in JavaScript, leading to
potential integer overflows or other bounds checking issues.
- CVE-2016-9063 (denial of service)
An integer overflow vulnerability has been discovered during the
parsing of XML using the Expat library.
- CVE-2016-9064 (insufficient validation)
Add-on updates failed to verify that the add-on ID inside the signed
package matched the ID of the add-on being updated. An attacker who
could perform a man-in-the-middle attack on the user's connection to
the update server and defeat the certificate pinning protection could
provide a malicious signed add-on instead of a valid update.
- CVE-2016-9066 (arbitrary code execution)
A buffer overflow resulting in a potentially exploitable crash due to
memory allocation issues when handling large amounts of incoming data.
- CVE-2016-9067 (arbitrary code execution)
Two heap-use-after-free errors during DOM operations in
nsINode::ReplaceOrInsertBefore resulting in potentially exploitable
crashes.
- CVE-2016-9068 (arbitrary code execution)
A heap-use-after-free in nsRefreshDriver during web animations when
working with timelines resulting in a potentially exploitable crash.
- CVE-2016-9070 (same-origin policy bypass)
A maliciously crafted page loaded to the sidebar through a bookmark can
reference a privileged chrome window and engage in limited JavaScript
operations violating cross-origin protections.
- CVE-2016-9071 (information disclosure)
Content Security Policy combined with HTTP to HTTPS redirection can be
used by malicious server to verify whether a known site is within a
user's browser history.
- CVE-2016-9073 (sandbox escape)
WebExtensions can bypass security checks to load privileged URLs and
potentially escape the WebExtension sandbox.
- CVE-2016-9075 (privilege escalation)
An issue where WebExtensions can use the mozAddonManager API to elevate
privilege due to privileged pages being allowed in the permissions
list. This allows a malicious extension to then install additional
extensions without explicit user permission.
- CVE-2016-9076 (content spoofing)
An issue where a <select> dropdown menu can be used to cover location
bar content, resulting in potential spoofing attacks. This attack
requires e10s to be enabled in order to function.
- CVE-2016-9077 (information disclosure)
Canvas allows the use of the feDisplacementMap filter on images loaded
cross-origin. The rendering by the filter is variable depending on the
input pixel, allowing for timing attacks when the images are loaded
from third party locations.
Impact
======
A remote attacker is able to execute arbitrary code, disclose sensitive
information, escape the WebExtension sandbox, spoof content and bypass
the same-origin policy via various vectors.
References
==========
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-5289
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-5290
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-5291
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-5292
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-5296
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-5297
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9063
https://github.com/libexpat/libexpat/commit/d4f735b88d9932bd5039df2335eefdd0723dbe20
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9064
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9066
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9067
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9068
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9070
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9071
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9073
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9075
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9076
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9077
https://security.archlinux.org/CVE-2016-5289
https://security.archlinux.org/CVE-2016-5290
https://security.archlinux.org/CVE-2016-5291
https://security.archlinux.org/CVE-2016-5292
https://security.archlinux.org/CVE-2016-5296
https://security.archlinux.org/CVE-2016-5297
https://security.archlinux.org/CVE-2016-9063
https://security.archlinux.org/CVE-2016-9064
https://security.archlinux.org/CVE-2016-9066
https://security.archlinux.org/CVE-2016-9067
https://security.archlinux.org/CVE-2016-9068
https://security.archlinux.org/CVE-2016-9070
https://security.archlinux.org/CVE-2016-9071
https://security.archlinux.org/CVE-2016-9073
https://security.archlinux.org/CVE-2016-9075
https://security.archlinux.org/CVE-2016-9076
https://security.archlinux.org/CVE-2016-9077
|