Lucene search

K
kasperskyKaspersky LabKLA11246
HistoryMay 09, 2018 - 12:00 a.m.

KLA11246 Multiple vulnerabilities in Mozilla Firefox and Firefox ESR

2018-05-0900:00:00
Kaspersky Lab
threats.kaspersky.com
108

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

10 High

AI Score

Confidence

High

0.122 Low

EPSS

Percentile

95.4%

Multiple serious vulnerabilities have been found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, gain privileges, execute arbitrary code, perform XSS attacks and bypass security restrictions. Below is a complete list of vulnerabilities:

  1. A use-after-free vulnerability with SVG animations and clip paths can be exploited remotely to execute arbitrary code or cause denial of service;
  2. A use-after-free vulnerability with SVG animations and text paths can be exploited remotely to execute arbitrary code or cause denial of service;
  3. Same-origin bypass vulnerability in PDF Viewer can be exploited remotely to execute arbitrary code;
  4. A code injection vulnerability in PDF Viewer can be exploited remotely to execute arbitrary code;
  5. An integer overflow and out-of-bounds write in Skia can be exploited remotely to cause denial of service;
  6. An uninitialized memory use in WebRTC encoder can be exploited remotely to cause denial of service;
  7. An information leak vulnerability in WebExtentions can be exploited remotely to obtain sensitive information;
  8. An out-of-bounds read vulnerability in mixed content websocket messages can be exploited remotely to cause denial of service;
  9. A unspecified vulnerability in JavaScript Start-up Bytecode Cache can be exploited remotely to gain privileges;
  10. An unspecified vulnerability in CSP can be exploited remotely to perform cross-site scripting attacks;
  11. A permission bypass vulnerability in WebExtensions can be exploited remotely to bypass security restrictions;
  12. An unspecified vulnerability in JavaScript debugger can be exploited remotely to perform unspecified attacks;
  13. An unspecified vulnerability can be exploited remotely to bypass security restrictions;
  14. An unspecified vulnerability can be exploited remotely to execute arbitrary code;
  15. An unspecified vulnerability can be exploited remotely to obtain sensitive information;
  16. An unspecified vulnerability can be exploited remotely to execute arbitrary code;
  17. An unspecified vulnerability in CSP can be exploited remotely to bypass security restrictions;
  18. A script injection vulnerability in JSON Viewer can be exploited remotely to obtain sensitive information;
  19. A buffer overflow vulnerability in XSLT can be exploited remotely to cause denial of service;
  20. A buffer overflow vulnerability can be exploited remotely via UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data to cause denial of service;
  21. A vulnerability related to Flash protected mode can be exploited remotely to perform unspecified attacks;
  22. An use-after-free vulnerability in WebGL can be exploited remotely to cause denial of service;

Technical details

Vulnerabilities (6)-(15) and (17)-(19), (21), (22) only affects Mozilla Firefox;

Vulnerability (20) only affects Mozilla Firefox ESR;

Vulnerability (16) only affects Windows 10 users running the April 2018 update or later. It does not affect other Windows users or other operating systems.

NB: At this moment Mozilla has just reserved CVE numbers for these vulnerabilities. Information can be changed soon.

Original advisories

Mozilla Foundation Security Advisory 2018-11

Mozilla Foundation Security Advisory 2018-12

Exploitation

Public exploits exist for this vulnerability.

Related products

Mozilla-Firefox

Mozilla-Firefox-ESR

CVE list

CVE-2018-5154 critical

CVE-2018-5155 critical

CVE-2018-5157 warning

CVE-2018-5158 high

CVE-2018-5159 critical

CVE-2018-5160 warning

CVE-2018-5152 warning

CVE-2018-5153 warning

CVE-2018-5163 high

CVE-2018-5164 warning

CVE-2018-5166 warning

CVE-2018-5167 warning

CVE-2018-5168 warning

CVE-2018-5169 warning

CVE-2018-5172 warning

CVE-2018-5173 warning

CVE-2018-5174 warning

CVE-2018-5175 warning

CVE-2018-5176 warning

CVE-2018-5177 warning

CVE-2018-5165 warning

CVE-2018-5180 warning

CVE-2018-5181 warning

CVE-2018-5182 warning

CVE-2018-5151 critical

CVE-2018-5150 critical

CVE-2018-5183 critical

CVE-2018-5178 high

CVE-2018-5179 warning

Solution

Update to the latest versionDownload Mozilla Firefox

Download Mozilla Firefox ESR

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • XSS/CSS

Cross site scripting. Exploitation of vulnerabilities with this impact can lead to partial interception of information transmitted between user and site.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Mozilla Firefox ESR earlier than 52.8Mozilla Firefox earlier than 60

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

10 High

AI Score

Confidence

High

0.122 Low

EPSS

Percentile

95.4%