Lucene search

K
archlinuxArchLinuxASA-201902-16
HistoryFeb 13, 2019 - 12:00 a.m.

[ASA-201902-16] firefox: multiple issues

2019-02-1300:00:00
security.archlinux.org
24

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.024 Low

EPSS

Percentile

89.9%

Arch Linux Security Advisory ASA-201902-16

Severity: High
Date : 2019-02-13
CVE-ID : CVE-2018-18356 CVE-2018-18511 CVE-2019-5785
Package : firefox
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-896

Summary

The package firefox before version 65.0.1-1 is vulnerable to multiple
issues including arbitrary code execution and same-origin policy
bypass.

Resolution

Upgrade to 65.0.1-1.

pacman -Syu “firefox>=65.0.1-1”

The problems have been fixed upstream in version 65.0.1.

Workaround

None.

Description

  • CVE-2018-18356 (arbitrary code execution)

A use-after-free has been found in the Skia component of chromium
before 71.0.3578.80 and firefox before 65.0.1.

  • CVE-2018-18511 (same-origin policy bypass)

A cross-origin theft of images issue has been found in the
ImageBitmapRenderingContext component of firefox 65.0, where cross-
origin images can be read from a canvas element in violation of the
same-origin policy using the transferFromImageBitmap method. The issue
has been fixed in 65.0.1 and versions prior to 65.0 were not affected.

  • CVE-2019-5785 (arbitrary code execution)

An integer overflow issue has been found in the Skia component of
firefox before 65.0.1.

Impact

A remote attacker can bypass the same-origin policy to access sensitive
information, or execute arbitrary code, via a crafted web content.

References

https://www.mozilla.org/en-US/security/advisories/mfsa2019-04/
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
https://bugs.chromium.org/p/chromium/issues/detail?id=883666
https://www.mozilla.org/en-US/security/advisories/mfsa2019-04/#CVE-2018-18356
https://bugzilla.mozilla.org/show_bug.cgi?id=1525817
https://www.mozilla.org/en-US/security/advisories/mfsa2019-04/#CVE-2019-5785
https://bugzilla.mozilla.org/show_bug.cgi?id=1526218
https://bugzilla.mozilla.org/show_bug.cgi?id=1525433
https://googleprojectzero.blogspot.com/2019/02/the-curious-case-of-convexity-confusion.html
https://security.archlinux.org/CVE-2018-18356
https://security.archlinux.org/CVE-2018-18511
https://security.archlinux.org/CVE-2019-5785

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyfirefox< 65.0.1-1UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.024 Low

EPSS

Percentile

89.9%