SB2017100306 - Ubuntu update for Firefox 



SB2017100306 - Ubuntu update for Firefox

Published: October 3, 2017

Security Bulletin ID SB2017100306
Severity
High
Patch available
YES
Number of vulnerabilities 16
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 44% Medium 19% Low 38%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 16 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2017-7793)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error in the Fetch API when the worker or the associated window are freed when still in use. A remote unauthenticated attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Memory corruption (CVE-ID: CVE-2017-7810)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper bounds checking. A remote attacker can create a specially crafted web page, trick the victim into opening it and execute arbitrary code on the target system.

3) Memory corruption (CVE-ID: CVE-2017-7811)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper bounds checking. A remote attacker can create a specially crafted web page, trick the victim into opening it and execute arbitrary code on the target system.

4) Improper access control (CVE-ID: CVE-2017-7812)

The vulnerability allows a remote attacker to read local files on user's system.

If web content on a page is dragged onto portions of the browser UI, such as the tab bar, links can be opened that otherwise would not be allowed to open. This can allow malicious web content to open a locally stored file through file: URLs.

5) Memory leak (CVE-ID: CVE-2017-7813)

The vulnerability allows a remote attacker to gain access to parts of system memory.

Inside the JavaScript parser, a cast of an integer to a narrower type can result in data read from outside the buffer being parsed. This usually results in a non-exploitable crash, but can leak a limited amount of information from memory if it matches JavaScript identifier syntax.

6) Blob and data URLs bypass phishing and malware protection warnings (CVE-ID: CVE-2017-7814)

The vulnerability allows a remote attacker to bypass phishing and malware protection warnings.

File downloads encoded with blob: and data: URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious.

7) Spoofing attack with modal dialogs on non-e10s installations (CVE-ID: CVE-2017-7815)

The vulnerability allows a remote attacker to perform spoofing attack.

On pages containing an iframe, the data: protocol can be used to create a modal dialog through Javascript that will have an arbitrary domains as the dialog's location, spoofing of the origin of the modal dialog from the user view.

Note: This attack only affects installations with e10 multiprocess turned off. Installations with e10s turned on do not support the modal dialog functionality.

8) Use-after-free (CVE-ID: CVE-2017-7818)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error when manipulating arrays of Accessible Rich Internet Applications (ARIA) elements within containers through the DOM. A remote unauthenticated attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


9) Use-after-free (CVE-ID: CVE-2017-7819)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. A remote unauthenticated attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


10) Security restrictions bypass (CVE-ID: CVE-2017-7820)

The vulnerability allows a remote attacker to bypass certain security restrictions.

The instanceof operator can bypass the Xray wrapper mechanism. When called on web content from the browser itself or an extension the web content can provide its own result for that operator, possibly tricking the browser or extension into mishandling the element.

11) WebCrypto allows AES-GCM with 0-length IV (CVE-ID: CVE-2017-7822)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The AES-GCM implementation in WebCrypto API accepts 0-length IV when it should require a length of 1 according to the NIST Special Publication 800-38D specification. This might allow for the authentication key to be determined in some instances.

12) Cross-site scripting (CVE-ID: CVE-2017-7823)

The vulnerability allows a remote attacker to perform XSS attacks.

The content security policy (CSP) sandbox directive did not create a unique origin for the document, causing it to behave as if the allow-same-origin keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content.

13) Buffer overflow (CVE-ID: CVE-2017-7824)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper bounds checking when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks. A remote attacker can create a specially crafted web page, trick the victim into opening it and execute arbitrary code on the target system.

14) Use-after-free (CVE-ID: CVE-2017-7805)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error during TLS 1.2 exchanges. A remote unauthenticated attacker can create a specially crafted web server, trick the victim into visiting it and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


15) Security restrictions bypass (CVE-ID: CVE-2017-7816)

The vulnerability allows a remote attacker to bypass certain security restrictions.

WebExtensions could use popups and panels in the extension UI to load an about: privileged URL, violating security checks that disallow this behavior.

16) Security restrictions bypass (CVE-ID: CVE-2017-7821)

The vulnerability allows a remote attacker to bypass certain security restrictions.

A vulnerability where WebExtensions can download and attempt to open a file of some non-executable file types. This can be triggered without specific user interaction for the file download and open actions. This could be used to trigger known vulnerabilities in the programs that handle those document types.

Remediation

Install update from vendor's website.