Lucene search

K
kasperskyKaspersky LabKLA10689
HistoryNov 03, 2015 - 12:00 a.m.

KLA10689 Multiple vulnerabilities in Mozilla Firefox and Firefox ESR

2015-11-0300:00:00
Kaspersky Lab
threats.kaspersky.com
61

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.096

Percentile

94.9%

Multiple serious vulnerabilities have been found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, bypass security restrictions, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Improper memory handling can be exploited via an unknown vectors to cause denial of service or execute arbitrary code;
  2. Improper authentication requests handling can be exploited remotely via a specially designed web-page to obtain sensitive information;
  3. Lack of content restrictions at Reader mode can be exploited remotely via a specially designed content to bypass CSP security restrictions;
  4. An unknown vulnerability at fullscreen mode can be exploited remotely via a specially designed script to spoof user interface; (Android)
  5. An unknown vulnerability can be exploited via a specially designed HTML file to files manipulations or obtain sensitive information; (Android)
  6. Lack of script execution restrictions at third-party panel addons can be exploited remotely via specially designed inline scripts to execute arbitrary code;
  7. Improper handling hostname as ip address can be exploited remotely via a specially designed hostname to execute arbitrary code;
  8. Race condition at JPEGEncoder can be exploited remotely via a specially designed script to cause denial of service or execute arbitrary code;
  9. Improper privileges restrictions can be exploited via Android intent manipulations to cause denial of service or obtain sensitive information; (Android)
  10. Improper address sterilization ca be exploited remotely via a specially designed Android intent manipulations to execute arbitrary code;
  11. Improper HTML tables exposition can be exploited remotely to execute arbitrary code; (OS X)
  12. Improper CORS implementation can be exploited remotely via a specially designed requests to bypass security restrictions;
  13. An unknown vulnerability at libjar can be exploited remotely via a specially designed ZIP file to execute arbitrary code;
  14. Improper escaped characters parsing can be exploited remotely via a specially designed URL to obtain sensitive information;
  15. Improper Java applets and JavaScript can be exploited remotely to cause denial of service or execute arbitrary code;
  16. Buffer overflow at ANGLE library can be potentially exploited;
  17. Improper status handling at SVG rendering and during cryptographic key manipulations can be potentially exploited;
  18. An unknown vulnerability at web worker can be exploited remotely to bypass security restrictions;
  19. use-after-poison and buffer overflow at Network Security Services can be exploited remotely to cause denial of service or execute arbitrary code;
  20. Integer overflow at Netscape Portable Runtime can be exploited remotely to cause denial fo service or execute arbitrary code.

Technical details

Vulnerability (2) caused by sending type 3 messages during authentication exchange. which in its turn caused by workstation field populating with the hostname of system making request for NTLM-based HTTP authentication. This vulnerability mitigated because NTLM v1 disabled by default.

Reader mode disables scripts for rendered pages through a witelist of allowed HTML content. Vulnerability (3) caused by too permissive whitelist.

Vulnerability (4) caused by not restoring addressbar when window is redrawn from fullscreen to normal mode. Vulnerable behavior can be triggered and then exploited by script.

Locally saved HTML file could use file: URIs to trigger the download of additional files or opening of cached profile data without user awareness. (5)

When a panel is created using the add-on SDK, defining panel with script: false is supposed to disable script execution. But it was found that inline script would still execute. This behavior causes vulnerability (6). add-ons served from addons.mozilla.org are not vulnerable for (6) but third party sites served may be.

Vulnerability (7) caused by trailing whitespaces evaluated differently when parsing IP instead of alphanumeric hostnames.

Firefox can be registered to be used by search engine through Android intent. When Firefox is launched, the URL can be executed with Firefox’s system privileges if the crash reporter is used. This allows reading local log files, potentially leaking private information. This vulnerability (9) affects only Firefox for Android on Android versions 4.4 and earlier. Maximum impact for other android is non-exploitable crash.

Vulnerability (11) triggered by accessibility tools request for index of a table row through the NSAccessibilityIndexAttribute value.

Vulnerability (14) caused by abandoning parsing process when an effected escaped character is encountered followed by a navigation to the previously parsed version of the URL. When site allowing for navigation redirection for escaped characters this could lead to extraction of site-specific tokens.

Vulnerability (15) caused by permission for Java plugin to deallocate JavaScript wrapper. Which leads to a JavaScript garbage collection crash.

Vulnerability (19) caused by errors in octet string parsing. This issue was fixed at NSS versions 3.16.2.1 and 3.19.4 shipped in Firefox and Firefox ESR, respectively, as well as NSS 3.20.1.

Vulnerability (20) caused by lack of checks during memory allocation. This issues was fixed in NSPR 4.10.10. NSPR is required component of NSS.

Original advisories

Mozilla foundation security advisories

Related products

Mozilla-Firefox

Mozilla-Firefox-ESR

CVE list

CVE-2015-7183 critical

CVE-2015-7200 critical

CVE-2015-7199 critical

CVE-2015-7198 critical

CVE-2015-7197 warning

CVE-2015-7196 high

CVE-2015-7195 warning

CVE-2015-7194 critical

CVE-2015-7193 critical

CVE-2015-7192 critical

CVE-2015-7191 warning

CVE-2015-7190 warning

CVE-2015-7189 high

CVE-2015-7188 critical

CVE-2015-7187 warning

CVE-2015-7186 warning

CVE-2015-7185 warning

CVE-2015-7182 critical

CVE-2015-7181 critical

CVE-2015-4518 warning

CVE-2015-4515 warning

CVE-2015-4514 critical

CVE-2015-4513 critical

Solution

Update to the latest versionGet Firefox

Get Firefox ESR

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • XSS/CSS

Cross site scripting. Exploitation of vulnerabilities with this impact can lead to partial interception of information transmitted between user and site.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

  • LoI

Loss of integrity. Exploitation of vulnerabilities with this impact can lead to partial system fault or system components connection disruption.

Affected Products

  • Mozilla Firefox versions earlier than 42Mozilla Firefox ESR versions earlier than 38.4

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.096

Percentile

94.9%