Arch Linux Security Advisory ASA-201701-39 ========================================== Severity: Critical Date : 2017-01-29 CVE-ID : CVE-2017-5373 CVE-2017-5374 CVE-2017-5375 CVE-2017-5376 CVE-2017-5377 CVE-2017-5378 CVE-2017-5379 CVE-2017-5380 CVE-2017-5381 CVE-2017-5382 CVE-2017-5383 CVE-2017-5384 CVE-2017-5385 CVE-2017-5386 CVE-2017-5387 CVE-2017-5388 CVE-2017-5389 CVE-2017-5390 CVE-2017-5391 CVE-2017-5393 CVE-2017-5396 Package : firefox Type : multiple issues Remote : Yes Link : https://security.archlinux.org/AVG-157 Summary ======= The package firefox before version 51.0.1-1 is vulnerable to multiple issues including arbitrary code execution, access restriction bypass, information disclosure, privilege escalation, arbitrary file overwrite, content spoofing and denial of service. Resolution ========== Upgrade to 51.0.1-1. # pacman -Syu "firefox>=51.0.1-1" The problems have been fixed upstream in version 51.0. Workaround ========== None. Description =========== - CVE-2017-5373 (arbitrary code execution) Several memory safety bugs have been found in Firefox < 51 and Thunderbird < 47.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. - CVE-2017-5374 (arbitrary code execution) Several memory safety bugs have been found in Firefox < 51. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. - CVE-2017-5375 (arbitrary code execution) JIT code allocation in Firefox < 51 and Thunderbird < 45.7 can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. - CVE-2017-5376 (arbitrary code execution) A use-after-free vulnerability has been found in Firefox < 51 and Thunderbird < 45.7, while manipulating XSL in XSLT documents. - CVE-2017-5377 (arbitrary code execution) A memory corruption vulnerability in Skia that can occur when using transforms to make gradients, resulting in a potentially exploitable crash. - CVE-2017-5378 (information disclosure) An information disclosure vulnerability has been found in Firefox < 51 and Thunderbird < 45.7, where hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object’s address can be discovered through hash codes, and also allows for data leakage of an object’s content using these hash codes. - CVE-2017-5379 (arbitrary code execution) A use-after-free vulnerability has been found in Firefox < 51, in Web Animations, when interacting with cycle collection. - CVE-2017-5380 (arbitrary code execution) A potential use-after-free vulnerability during DOM manipulation of SVG content has been in Firefox < 51 and Thunderbird < 45.7. - CVE-2017-5381 (arbitrary file overwrite) The "export" function in the Firefox < 51 Certificate Viewer can force local filesystem navigation when the "common name" in a certificate contains slashes, allowing certificate content to be saved in unsafe locations with an arbitrary filename. - CVE-2017-5382 (information disclosure) Feed preview for RSS feeds in Firefox < 51 can be used to capture errors and exceptions generated by privileged content, allowing for the exposure of internal information not meant to be seen by web content. - CVE-2017-5383 (content spoofing) URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger punycode display in Firefox < 51 and Thunderbird < 45.7, allowing for domain name spoofing attacks in the location bar. - CVE-2017-5384 (information disclosure) Proxy Auto-Config (PAC) files in Firefox < 51 can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely. - CVE-2017-5385 (information disclosure) In Firefox < 51, data sent with in multipart channels, such as the multipart/x-mixed-replace MIME type, will ignore the referrer-policy response header, leading to potential information disclosure for sites using this header. - CVE-2017-5386 (privilege escalation) WebExtension scripts in Firefox < 51 can use the data: protocol to affect pages loaded by other web extensions using this protocol, leading to potential data disclosure or privilege escalation in affected extensions. - CVE-2017-5387 (information disclosure) The existence of a specifically requested local file can be found in Firefox < 51 due to the double firing of the onerror when the source attribute on a tag refers to a file that does not exist if the source page is loaded locally. - CVE-2017-5388 (denial of service) In Firefox < 51, a STUN server in conjunction with a large number of webkitRTCPeerConnection objects can be used to send large STUN packets in a short period of time due to a lack of rate limiting being applied on e10s systems, allowing for a denial of service attack. - CVE-2017-5389 (access restriction bypass) WebExtensions in Firefox < 51 could use the mozAddonManager API by modifying the CSP headers on sites with the appropriate permissions and then using host requests to redirect script loads to a malicious site. This allows a malicious extension to then install additional extensions without explicit user permission. - CVE-2017-5390 (privilege escalation) The JSON viewer in the Developer Tools in Firefox < 51 and Thunderbird < 45.7 uses insecure methods to create a communication channel for copying and viewing JSON or HTTP headers data, allowing for potential privilege escalation. - CVE-2017-5391 (privilege escalation) In Firefox < 51, special about: pages used by web content, such as RSS feeds, can load privileged about: pages in an iframe. If a content- injection bug were found in one of those pages this could allow for potential privilege escalation. - CVE-2017-5393 (access restriction bypass) The mozAddonManager in Firefox < 51 allows for the installation of extensions from the CDN for addons.mozilla.org, a publicly accessible site. This could allow malicious extensions to install additional extensions from the CDN in combination with an XSS attack on Mozilla AMO sites. - CVE-2017-5396 (arbitrary code execution) A use-after-free vulnerability has been found in the Media Decoder of Firefox < 51 and Thunderbird < 45.7, when working with media files when some events are fired after the media elements are freed from memory. Impact ====== A remote attacker can access sensitive information, bypass access restrictions, overwrite arbitrary files, spoof content, escalate privileges and execute arbitrary code on the affected host. References ========== https://www.mozilla.org/en-US/security/advisories/mfsa2017-01 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5373 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1322315%2C1328834%2C1322420%2C1285833%2C1285960%2C1328251%2C1331058%2C1325938%2C1325877 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5374 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1325344%2C1317501%2C1311319%2C1329989%2C1300145%2C1322305%2C1288561%2C1295747%2C1318766%2C1297808%2C1321374%2C1324810%2C1313385%2C1319888%2C1302231%2C1307458%2C1293327%2C1315447%2C1319456 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5375 https://bugzilla.mozilla.org/show_bug.cgi?id=1325200 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5376 https://bugzilla.mozilla.org/show_bug.cgi?id=1311687 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5377 https://bugzilla.mozilla.org/show_bug.cgi?id=1306883 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5378 https://bugzilla.mozilla.org/show_bug.cgi?id=1312001 https://bugzilla.mozilla.org/show_bug.cgi?id=1330769 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5379 https://bugzilla.mozilla.org/show_bug.cgi?id=1309198 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5380 https://bugzilla.mozilla.org/show_bug.cgi?id=1322107 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5381 https://bugzilla.mozilla.org/show_bug.cgi?id=1017616 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5382 https://bugzilla.mozilla.org/show_bug.cgi?id=1295322 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5383 https://bugzilla.mozilla.org/show_bug.cgi?id=1323338 https://bugzilla.mozilla.org/show_bug.cgi?id=1324716 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5384 https://bugzilla.mozilla.org/show_bug.cgi?id=1255474 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5385 https://bugzilla.mozilla.org/show_bug.cgi?id=1295945 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5386 https://bugzilla.mozilla.org/show_bug.cgi?id=1319070 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5387 https://bugzilla.mozilla.org/show_bug.cgi?id=1295023 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5388 https://bugzilla.mozilla.org/show_bug.cgi?id=1281482 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5389 https://bugzilla.mozilla.org/show_bug.cgi?id=1308688 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5390 https://bugzilla.mozilla.org/show_bug.cgi?id=1297361 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5391 https://bugzilla.mozilla.org/show_bug.cgi?id=1309310 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5393 https://bugzilla.mozilla.org/show_bug.cgi?id=1309282 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5396 https://bugzilla.mozilla.org/show_bug.cgi?id=1329403 https://security.archlinux.org/CVE-2017-5373 https://security.archlinux.org/CVE-2017-5374 https://security.archlinux.org/CVE-2017-5375 https://security.archlinux.org/CVE-2017-5376 https://security.archlinux.org/CVE-2017-5377 https://security.archlinux.org/CVE-2017-5378 https://security.archlinux.org/CVE-2017-5379 https://security.archlinux.org/CVE-2017-5380 https://security.archlinux.org/CVE-2017-5381 https://security.archlinux.org/CVE-2017-5382 https://security.archlinux.org/CVE-2017-5383 https://security.archlinux.org/CVE-2017-5384 https://security.archlinux.org/CVE-2017-5385 https://security.archlinux.org/CVE-2017-5386 https://security.archlinux.org/CVE-2017-5387 https://security.archlinux.org/CVE-2017-5388 https://security.archlinux.org/CVE-2017-5389 https://security.archlinux.org/CVE-2017-5390 https://security.archlinux.org/CVE-2017-5391 https://security.archlinux.org/CVE-2017-5393 https://security.archlinux.org/CVE-2017-5396