Lucene search

K
kasperskyKaspersky LabKLA10525
HistoryMar 31, 2015 - 12:00 a.m.

KLA10525 Multiple vulnerabilities in Mozilla Firefox, Mozilla Firefox ESR, Mozilla Thunderbird

2015-03-3100:00:00
Kaspersky Lab
threats.kaspersky.com
39

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

8 High

AI Score

Confidence

High

0.961 High

EPSS

Percentile

99.5%

Multiple serious vulnerabilities have been found in Mozilla Firefox before 37.0, Mozilla Firefox ESR 31.x before 31.6, Mozilla Thunderbird before 31.6. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause a denial of service (heap memory corruption) and bypass an intended user-confirmation requirement.

Below is a complete list of vulnerabilities

  1. Improper resource:URLs restrictions, which can lead to execution arbitrary JavaScript code to bypass the Same Origin Policy;
  2. Multiple unspecified vulnerabilities in the browser engine can be exploited via unknown vectors;
  3. Lack of HTTPS session enforcement for lightweight theme add-on installations in Mozilla Firefox before 37.0 can lead to man-in-the-middle attacks;
  4. The QCMS implementation in Mozilla Firefox can be exploited via an image that is improperly handled during transformation;
  5. The webrtc::VPMContentAnalysis::Release function in the WebRTC implementation in Mozilla Firefox before 37.0 can be exploited via unspecified vectors;
  6. The navigator.sendBeacon implementation can be exploited via a crafted web site;
  7. The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 can be exploited via vectors that trigger rendering of 2D graphics content;
  8. The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 can be exploited via a crafted HTML document containing a SOURCE element.

Original advisories

Mozilla Foundation Security Advisories

Exploitation

Public exploits exist for this vulnerability.

Related products

Mozilla-Firefox

Mozilla-Thunderbird

Mozilla-Firefox-ESR

CVE list

CVE-2015-0812 warning

CVE-2015-0813 high

CVE-2015-0810 warning

CVE-2015-0811 high

CVE-2015-0815 critical

CVE-2015-0814 critical

CVE-2015-0805 critical

CVE-2015-0806 critical

CVE-2015-0804 critical

CVE-2015-0816 critical

CVE-2015-0807 high

CVE-2015-0808 critical

Solution

Update to latest versionGet Mozilla Firefox ESRGet Mozilla Firefox

Get Mozilla Thunderbird

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • WLF

Write Local Files. Exploitation of vulnerabilities with this impact can lead to writing into some inaccessible files. Files that can be read depends on concrete program errors.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Mozilla Firefox before 37.0Mozilla Firefox ESR 31.x before 31.6MozillaΒ Thunderbird before 31.6

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

8 High

AI Score

Confidence

High

0.961 High

EPSS

Percentile

99.5%