CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
AI Score
Confidence
Low
EPSS
Percentile
99.9%
USN-2656-1 fixed vulnerabilities in Firefox for Ubuntu 14.04 LTS and
later releases.
This update provides the corresponding update for Ubuntu 12.04 LTS.
Original advisory details:
Karthikeyan Bhargavan discovered that NSS incorrectly handled state
transitions for the TLS state machine. If a remote attacker were able to
perform a machine-in-the-middle attack, this flaw could be exploited to skip
the ServerKeyExchange message and remove the forward-secrecy property.
(CVE-2015-2721)
Looben Yan discovered 2 use-after-free issues when using XMLHttpRequest in
some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit these to cause a
denial of service via application crash, or execute arbitrary code with
the privileges of the user invoking Firefox. (CVE-2015-2722,
CVE-2015-2733)
Bob Clary, Christian Holler, Bobby Holley, Andrew McCreight, Terrence
Cole, Steve Fink, Mats Palmgren, Wes Kocher, Andreas Pehrson, Tooru
Fujisawa, Andrew Sutherland, and Gary Kwong discovered multiple memory
safety issues in Firefox. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit these to cause a
denial of service via application crash, or execute arbitrary code with
the privileges of the user invoking Firefox. (CVE-2015-2724,
CVE-2015-2725, CVE-2015-2726)
Armin Razmdjou discovered that opening hyperlinks with specific mouse
and key combinations could allow a Chrome privileged URL to be opened
without context restrictions being preserved. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to bypass security restrictions. (CVE-2015-2727)
Paul Bandha discovered a type confusion bug in the Indexed DB Manager. If
a user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to cause a denial of service via
application crash or execute arbitrary code with the priviliges of the
user invoking Firefox. (CVE-2015-2728)
Holger Fuhrmannek discovered an out-of-bounds read in Web Audio. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to obtain sensitive information.
(CVE-2015-2729)
Watson Ladd discovered that NSS incorrectly handled Elliptical Curve
Cryptography (ECC) multiplication. A remote attacker could possibly use
this issue to spoof ECDSA signatures. (CVE-2015-2730)
A use-after-free was discovered when a Content Policy modifies the DOM to
remove a DOM object. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash or execute arbitrary code with the
priviliges of the user invoking Firefox. (CVE-2015-2731)
Ronald Crane discovered multiple security vulnerabilities. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2015-2734, CVE-2015-2735, CVE-2015-2736, CVE-2015-2737,
CVE-2015-2738, CVE-2015-2739, CVE-2015-2740)
David Keeler discovered that key pinning checks can be skipped when an
overridable certificate error occurs. This allows a user to manually
override an error for a fake certificate, but cannot be exploited on its
own. (CVE-2015-2741)
Jonas Jenwald discovered that some internal workers were incorrectly
executed with a high privilege. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this in
combination with another security vulnerability, to execute arbitrary code
in a privileged scope. (CVE-2015-2743)
Matthew Green discovered a DHE key processing issue in NSS where a MITM
could force a server to downgrade TLS connections to 512-bit export-grade
cryptography. An attacker could potentially exploit this to impersonate
the server. (CVE-2015-4000)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 12.04 | noarch | firefox | < 39.0+build5-0ubuntu0.12.04.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | abrowser | < 39.0+build5-0ubuntu0.12.04.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | abrowser-branding | < 39.0+build5-0ubuntu0.12.04.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | firefox-branding | < 39.0+build5-0ubuntu0.12.04.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | firefox-dbg | < 39.0+build5-0ubuntu0.12.04.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | firefox-dbgsym | < 39.0+build5-0ubuntu0.12.04.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | firefox-dev | < 39.0+build5-0ubuntu0.12.04.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | firefox-dev-dbgsym | < 39.0+build5-0ubuntu0.12.04.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | firefox-globalmenu | < 39.0+build5-0ubuntu0.12.04.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | firefox-locale-af | < 39.0+build5-0ubuntu0.12.04.2 | UNKNOWN |
ubuntu.com/security/CVE-2015-2721
ubuntu.com/security/CVE-2015-2722
ubuntu.com/security/CVE-2015-2724
ubuntu.com/security/CVE-2015-2725
ubuntu.com/security/CVE-2015-2726
ubuntu.com/security/CVE-2015-2727
ubuntu.com/security/CVE-2015-2728
ubuntu.com/security/CVE-2015-2729
ubuntu.com/security/CVE-2015-2730
ubuntu.com/security/CVE-2015-2731
ubuntu.com/security/CVE-2015-2733
ubuntu.com/security/CVE-2015-2734
ubuntu.com/security/CVE-2015-2735
ubuntu.com/security/CVE-2015-2736
ubuntu.com/security/CVE-2015-2737
ubuntu.com/security/CVE-2015-2738
ubuntu.com/security/CVE-2015-2739
ubuntu.com/security/CVE-2015-2740
ubuntu.com/security/CVE-2015-2741
ubuntu.com/security/CVE-2015-2743
ubuntu.com/security/CVE-2015-4000
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
AI Score
Confidence
Low
EPSS
Percentile
99.9%