ASA-201711-23 generated external raw

[ASA-201711-23] firefox: multiple issues
Arch Linux Security Advisory ASA-201711-23 ========================================== Severity: Critical Date : 2017-11-15 CVE-ID : CVE-2017-7826 CVE-2017-7827 CVE-2017-7828 CVE-2017-7830 CVE-2017-7831 CVE-2017-7832 CVE-2017-7833 CVE-2017-7834 CVE-2017-7835 CVE-2017-7836 CVE-2017-7837 CVE-2017-7838 CVE-2017-7839 CVE-2017-7840 CVE-2017-7842 Package : firefox Type : multiple issues Remote : Yes Link : https://security.archlinux.org/AVG-494 Summary ======= The package firefox before version 57.0-1 is vulnerable to multiple issues including arbitrary code execution, same-origin policy bypass, access restriction bypass, content spoofing, information disclosure, privilege escalation and cross-site scripting. Resolution ========== Upgrade to 57.0-1. # pacman -Syu "firefox>=57.0-1" The problems have been fixed upstream in version 57.0. Workaround ========== None. Description =========== - CVE-2017-7826 (arbitrary code execution) Several reported memory safety bugs have been found in Firefox before 57.0. Some of these bugs showed evidence of memory corruption and with enough effort some of these could probably be exploited to run arbitrary code. - CVE-2017-7827 (arbitrary code execution) Several memory safety bugs have been found in Firefox before 57.0. Some of these bugs showed evidence of memory corruption and with enough effort some of these could probably be exploited to run arbitrary code. - CVE-2017-7828 (arbitrary code execution) A use-after-free vulnerability can occur in Firefox before 57.0 when flushing and resizing layout because the PressShell object has been freed while still in use. This results in a potentially exploitable crash during these operations. - CVE-2017-7830 (same-origin policy bypass) The Resource Timing API in Firefox before 57.0 incorrectly revealed navigations in cross-origin iframes. This is a same-origin policy violation and could allow for data theft of URLs loaded by users. - CVE-2017-7831 (information disclosure) A vulnerability has been found in Firefox before 57.0 where the security wrapper does not deny access to some exposed properties using the deprecated exposedProps mechanism on proxy objects. These properties should be explicitly unavailable to proxy objects. - CVE-2017-7832 (content spoofing) The combined, single character, version of the letter 'i' with any of the potential accents in unicode, such as acute or grave, can be spoofed in the addressbar of Firefox before 57.0 by the dotless version of 'i' followed by the same accent as a second character with most font sets. This allows for domain spoofing attacks because these combined domain names do not display as punycode. - CVE-2017-7833 (content spoofing) Some Arabic and Indic vowel marker characters can be combined with Latin characters in a domain name to eclipse the non-Latin character with some font sets on the addressbar of Firefox before 57.0. The non- Latin character will not be visible to most viewers. This allows for domain spoofing attacks because these combined domain names do not display as punycode. - CVE-2017-7834 (access restriction bypass) A data: URL loaded in a new tab of Firefox before 57.0 did not inherit the Content Security Policy (CSP) of the original page, allowing for bypasses of the policy including the execution of JavaScript. In prior versions when data: documents also inherited the context of the original page this would allow for potential cross-site scripting (XSS) attacks. - CVE-2017-7835 (access restriction bypass) Mixed content blocking of insecure (HTTP) sub-resources in a secure (HTTPS) document was not correctly applied for resources that redirect from HTTPS to HTTP, allowing content that should be blocked, such as scripts, to be loaded on a page in Firefox before 57.0. - CVE-2017-7836 (privilege escalation) The "pingsender" executable used by the Firefox Health Report before 57.0 dynamically loads a system copy of libcurl, which an attacker could replace. This allows for privilege escalation as the replaced libcurl code will run with Firefox's privileges. This attack requires an attacker have local system access. - CVE-2017-7837 (same-origin policy bypass) SVG loaded through tags in Firefox before 57.0 can use tags within the SVG data to set cookies for that page. - CVE-2017-7838 (content spoofing) Punycode format text in Firefox before 57.0 will be displayed for entire qualified international domain names in some instances when a sub-domain triggers the punycode display instead of the primary domain being displayed in native script and the sub-domain only displaying as punycode. This could be used for limited spoofing attacks due to user confusion. - CVE-2017-7839 (cross-site scripting) Control characters prepended before javascript: URLs pasted in the addressbar in Firefox before 57.0 can cause the leading characters to be ignored and the pasted JavaScript to be executed instead of being blocked. This could be used in social engineering and self-cross-site- scripting (self-XSS) attacks where users are convinced to copy and paste text into the addressbar. - CVE-2017-7840 (cross-site scripting) JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks in Firefox before 57.0. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file. - CVE-2017-7842 (information disclosure) If a document’s Referrer Policy attribute is set to "no-referrer" sometimes two network requests are made for elements instead of one in Firefox before 57.0. One of these requests includes the referrer instead of respecting the set policy to not include a referrer on requests. Impact ====== A remote attacker can bypass the same-origin policy or the content security policy, spoof the content of the addressbar, trick a user into a self-XSS attack, access sensitive information or execute arbitrary code on the affected host. A local attacker might be able to escalate privilege. References ========== https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/ https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7826 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1394530%2C1369561%2C1411458%2C1400003%2C1395138%2C1408412%2C1393840%2C1400763%2C1339259%2C1394265%2C1407740%2C1407751%2C1408005%2C1406398%2C1387799%2C1261175%2C1400554%2C1375146%2C1397811%2C1404636%2C1401804 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7827 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1399922%2C1403646%2C1403716%2C1365894%2C1402876%2C1406154%2C1384121%2C1384615%2C1407375%2C1339485%2C1361432%2C1394031%2C1383019%2C1407032%2C1387845%2C1386490 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7828 https://bugzilla.mozilla.org/show_bug.cgi?id=1406750 https://bugzilla.mozilla.org/show_bug.cgi?id=1412252 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7830 https://bugzilla.mozilla.org/show_bug.cgi?id=1408990 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7831 https://bugzilla.mozilla.org/show_bug.cgi?id=1392026 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7832 https://bugzilla.mozilla.org/show_bug.cgi?id=1408782 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7833 https://bugzilla.mozilla.org/show_bug.cgi?id=1370497 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7834 https://bugzilla.mozilla.org/show_bug.cgi?id=1358009 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7835 https://bugzilla.mozilla.org/show_bug.cgi?id=1402363 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7836 https://bugzilla.mozilla.org/show_bug.cgi?id=1401339 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7837 https://bugzilla.mozilla.org/show_bug.cgi?id=1325923 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7838 https://bugzilla.mozilla.org/show_bug.cgi?id=1399540 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7839 https://bugzilla.mozilla.org/show_bug.cgi?id=1402896 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7840 https://bugzilla.mozilla.org/show_bug.cgi?id=1366420 https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7842 https://bugzilla.mozilla.org/show_bug.cgi?id=1397064 https://security.archlinux.org/CVE-2017-7826 https://security.archlinux.org/CVE-2017-7827 https://security.archlinux.org/CVE-2017-7828 https://security.archlinux.org/CVE-2017-7830 https://security.archlinux.org/CVE-2017-7831 https://security.archlinux.org/CVE-2017-7832 https://security.archlinux.org/CVE-2017-7833 https://security.archlinux.org/CVE-2017-7834 https://security.archlinux.org/CVE-2017-7835 https://security.archlinux.org/CVE-2017-7836 https://security.archlinux.org/CVE-2017-7837 https://security.archlinux.org/CVE-2017-7838 https://security.archlinux.org/CVE-2017-7839 https://security.archlinux.org/CVE-2017-7840 https://security.archlinux.org/CVE-2017-7842