Lucene search

K
kasperskyKaspersky LabKLA11271
HistoryJun 26, 2018 - 12:00 a.m.

KLA11271 Multiple vulnerabilities in Mozilla Firefox and Mozilla Firefox ESR

2018-06-2600:00:00
Kaspersky Lab
threats.kaspersky.com
187

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.33 Low

EPSS

Percentile

97.1%

Multiple serious vulnerabilities have been found in Mozilla Firefox and Mozilla Firefox ESR. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, cause denial of service and obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Incorrect redirect handling in Mozilla Firefox can be exploited remotely via specially designed website to obtain sensitive information;
  2. Buffer overflow vulnerability occurring in canvas rendering can be exploited remotely via specially designed website to cause denial of service;
  3. Use-after-free vulnerability occurring in element deleting can be exploited remotely via specially designed website to cause denial of service;
  4. Integer overflow vulnerability in SwizzleData can be exploited remotely via specially designed website to cause denial of service;
  5. Integer overflow vulnerability in SSSE3 scaler can be exploited remotely via specially designed website to cause denial of service;
  6. Use-after-free vulnerability occurring in moving DOM nodes between documents can be exploited remotely via specially designed website to cause denial of service;
  7. incorrect requests handling in NPAPI plugins can be exploited remotely via specially designed website to obtain sensitive information;
  8. Vulnerability in IPC sandbox security policy can be exploited remotely via specially designed website to obtain sensitive information;
  9. Out-of-bounds read vulnerability in QCMS can be exploited remotely via specially designed website to obtain sensitive information;
  10. Vulnerability related to the PerformanceNavigationTiming method can be exploited to bypass Spectre mitigations;
  11. Vulnerability related to the browser does not warn users when opening executable files with the SettingContent-ms extension;
  12. Improper authorization process handling in WebExtensions can be exploited to gain privileges;
  13. Improper default security settings vulnerability in SameSite can be exploited to obtain sensitive information;
  14. Integer overflow vulnerability in Skia library can be exploited remotely to cause denial of service;

Technical details

Vulnerabilities (1,13,14) only affects Mozilla Firefox.

Vulnerabilities (4,12) only affects Mozilla Firefox and Mozilla Firefox ESR 60.

Vulnerability (11) only affects Mozilla Firefox ESR.

Vulnerability (12) only affects Windows 10 users.

Original advisories

Mozilla Foundation Security Advisory 2018-16

Mozilla Foundation Security Advisory 2018-15

Mozilla Foundation Security Advisory 2018-17

Related products

Mozilla-Firefox

Mozilla-Firefox-ESR

CVE list

CVE-2018-12358 warning

CVE-2018-12359 high

CVE-2018-12360 high

CVE-2018-12361 high

CVE-2018-12362 high

CVE-2018-12363 high

CVE-2018-12364 high

CVE-2018-12365 warning

CVE-2018-12366 warning

CVE-2018-12367 warning

CVE-2018-12368 critical

CVE-2018-12369 critical

CVE-2018-12370 high

CVE-2018-12371 high

CVE-2018-5156 critical

CVE-2018-5186 critical

CVE-2018-5187 critical

CVE-2018-5188 critical

Solution

Update to the latest versionDownload Mozilla Firefox

Download Mozilla Firefox ESR

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Mozilla Firefox earlier than 61Mozilla Firefox ESR 52 earlier than 52.9Mozilla Firefox ESR 60 earlier than 60.1

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.33 Low

EPSS

Percentile

97.1%