SB2017111428 - Multiple vulnerabilities in Mozilla Firefox 



SB2017111428 - Multiple vulnerabilities in Mozilla Firefox

Published: November 14, 2017

Security Bulletin ID SB2017111428
Severity
High
Patch available
YES
Number of vulnerabilities 15
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 20% Low 80%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 15 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2017-7828)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error when flushing and resizing layout because the PressShell object has been freed while still in use. A remote unauthenticated attacker can create a specially crafted web page, trick the victim into opening it and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Cross-origin information disclosure (CVE-ID: CVE-2017-7830)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to an error when processing cross-origin iframes in the Resource Timing API. A remote attacker can gain access to data, related to another URL. 


3) Information disclosure (CVE-ID: CVE-2017-7831)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the security wrapper does not deny access to some exposed properties using the deprecated exposedProps mechanism on proxy objects.


4) Spoofing attack (CVE-ID: CVE-2017-7832)

The vulnerability allows a remote attacker to spoof domain names.

The combined, single character, version of the letter 'i' with any of the potential accents in unicode, such as acute or grave, can be spoofed in the addressbar by the dotless version of 'i' followed by the same accent as a second character with most font sets. This allows for domain spoofing attacks because these combined domain names do not display as punycode.

A remote attacker can successfully perform a spoofing attack against domains with letter 'i.


5) Spoofing attack (CVE-ID: CVE-2017-7833)

The vulnerability allows a remote attacker to spoof domain names.

Some Arabic and Indic vowel marker characters can be combined with Latin characters in a domain name to eclipse the non-Latin character with some font sets on the addressbar. The non-Latin character will not be visible to most viewers. This allows for domain spoofing attacks because these combined domain names do not display as punycode.


6) CSP policy bypass (CVE-ID: CVE-2017-7834)

The vulnerability allows a remote attacker to bypass certain security restrictions.

A data: URL loaded in a new tab did not inherit the Content Security Policy (CSP) of the original page, allowing for bypasses of the policy including the execution of JavaScript. In prior versions when data: documents also inherited the context of the original page this would allow for potential cross-site scripting (XSS) attacks.


7) Security restrictions bypass (CVE-ID: CVE-2017-7835)

The vulnerability allows a remote attacker to bypass certain security restrictions.

Mixed content blocking of insecure (HTTP) sub-resources in a secure (HTTPS) document was not correctly applied for resources that redirect from HTTPS to HTTP, allowing content that should be blocked, such as scripts, to be loaded on a page.


8) Privilege escalation (CVE-ID: CVE-2017-7836)

The vulnerability allows a local user to escalate privileges on the system.

The "pingsender" executable used by the Firefox Health Report dynamically loads a system copy of libcurl, which an attacker could replace. This allows for privilege escalation as the replaced libcurl code will run with Firefox's privileges.
Note: This attack requires an attacker have local system access and only affects OS X and Linux. Windows systems are not affected.

9) Security restrictions bypass (CVE-ID: CVE-2017-7837)

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to SVG loaded through <img> tags can use <meta> tags within the SVG data to set cookies for that page. A remote attacker can set arbitrary cookies and track the user's browser through them.


10) Spoofing attack (CVE-ID: CVE-2017-7838)

The vulnerability allows a remote attacker to spoof domain names.

Punycode format text will be displayed for entire qualified international domain names in some instances when a sub-domain triggers the punycode display instead of the primary domain being displayed in native script and the sub-domain only displaying as punycode. This could be used for limited spoofing attacks due to user confusion.


11) Self-XSS prevention mechanism bypass (CVE-ID: CVE-2017-7839)

The vulnerability allows a remote attacker to bypass certain security restrictions.

Control characters prepended before javascript: URLs pasted in the addressbar can cause the leading characters to be ignored and the pasted JavaScript to be executed instead of being blocked. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks where users are convinced to copy and paste text into the addressbar.


12) Self-XSS prevention mechanism bypass (CVE-ID: CVE-2017-7840)

The vulnerability allows a remote attacker to bypass Self-XSS prevention mechanism.

JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file.


13) Referrer policy bypass (CVE-ID: CVE-2017-7842)

The vulnerability allows a remote attacker to bypass certain security restrictions.

If a document’s Referrer Policy attribute is set to "no-referrer" sometimes two network requests are made for <link> elements instead of one. One of these requests includes the referrer instead of respecting the set policy to not include a referrer on requests.


14) Buffer overflow (CVE-ID: CVE-2017-7827)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to unspecified boundary errors when processing web pages. A remote unauthenticated attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


15) Buffer overflow (CVE-ID: CVE-2017-7826)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to unspecified boundary errors when processing web pages. A remote unauthenticated attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.