Ubuntu update for Firefox



Risk High
Patch available YES
Number of vulnerabilities 30
CVE-ID CVE-2018-5089
CVE-2018-5090
CVE-2018-5091
CVE-2018-5092
CVE-2018-5093
CVE-2018-5094
CVE-2018-5095
CVE-2018-5097
CVE-2018-5098
CVE-2018-5099
CVE-2018-5100
CVE-2018-5101
CVE-2018-5102
CVE-2018-5103
CVE-2018-5104
CVE-2018-5109
CVE-2018-5114
CVE-2018-5115
CVE-2018-5117
CVE-2018-5122
CVE-2018-5105
CVE-2018-5113
CVE-2018-5116
CVE-2018-5106
CVE-2018-5107
CVE-2018-5108
CVE-2018-5111
CVE-2018-5112
CVE-2018-5118
CVE-2018-5119
CWE-ID CWE-119
CWE-416
CWE-120
CWE-190
CWE-264
CWE-200
CWE-451
Exploitation vector Network
Public exploit N/A
Vulnerable software
Ubuntu
Operating systems & Components / Operating system

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 30 vulnerabilities.

1) Memory corruption

EUVDB-ID: #VU10167

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5089

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger mmeory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3 External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory corruption

EUVDB-ID: #VU10168

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5090

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free error

EUVDB-ID: #VU10182

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5091

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error during WebRTC connections when interacting with the DTMF timers. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use-after-free error

EUVDB-ID: #VU10181

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5092

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error in a Web Worker. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Buffer overflow

EUVDB-ID: #VU10180

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5093

CWE-ID: CWE-120 - Buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to buffer overflow in WebAssembly during Memory/Table resizing. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Buffer overflow

EUVDB-ID: #VU10179

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5094

CWE-ID: CWE-120 - Buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to buffer overflow in WebAssembly when shrinkElements is called followed by garbage collection on memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Integer overflow

EUVDB-ID: #VU10178

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5095

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to integer overflow in the Skia library when allocating memory for edge builders. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use-after-free error

EUVDB-ID: #VU10177

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5097

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error during XSL transformations. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Use-after-free error

EUVDB-ID: #VU10176

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5098

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error when manipulating form input elements. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free error

EUVDB-ID: #VU10175

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5099

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error in the widget listener. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use-after-free error

EUVDB-ID: #VU10174

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5100

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error when IsPotentiallyScrollable arguments are freed from memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Use-after-free error

EUVDB-ID: #VU10173

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5101

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error when manipulating floating first-letter style elements. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Use-after-free error

EUVDB-ID: #VU10172

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5102

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error when manipulating HTML media elements with media streams. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Use-after-free error

EUVDB-ID: #VU10171

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5103

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error during mouse event handling. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Use-after-free error

EUVDB-ID: #VU10170

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5104

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error during font face manipulation. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Security restrictions bypass

EUVDB-ID: #VU10192

Risk: Low

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5109

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to the prompting and starting an audio capture session with an incorrect origin from the site making the capture request. A remote attacker can bypass security restrictions and cause user confusion about which site is making the request to capture an audio stream.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Security restrictions bypass

EUVDB-ID: #VU10198

Risk: Low

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5114

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to an error when the old value of an existing cookie changed to be HttpOnly remains accessible to scripts. A remote attacker can bypass security restrictions and gain access to the application.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Information disclosure

EUVDB-ID: #VU10187

Risk: Low

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5115

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to an error when an HTTP authentication prompt is triggered by a background network request. A remote attacker can open an HTTP authentication over the foreground page and send private credential information to a third party site.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Spoofing attack

EUVDB-ID: #VU10190

Risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5117

CWE-ID: CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)

Exploit availability: No

Description

The vulnerability allows a remote attacker to spoof browser address bar.

The vulnerability exists due to an error when right-to-left text is used in the addressbar with left-to-right alignment. A remote attacker can trick the victim into visiting a specially crafted website, and spoof the URL.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Integer overflow

EUVDB-ID: #VU10169

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5122

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to integer overflow in the DoCrypt function of WebCrypto. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Privilege escalation

EUVDB-ID: #VU10184

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5105

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to an error in WebExtensions. A local attacker can bypass prompts to save and open an arbitrarily downloaded file and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Security restrictions bypass

EUVDB-ID: #VU10199

Risk: Low

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5113

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to the failure to enforce the requirement of the browser.identity.launchWebAuthFlow function of WebExtensions is only allowed to load content over https:.. A remote attacker can bypass security restrictions and load privileges pages.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Information disclosure

EUVDB-ID: #VU10196

Risk: Low

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5116

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to an error in WebExtensions with the ActiveTab permission. A remote attacker can bypass security restrictions and access cross-origin frame content.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Information disclosure

EUVDB-ID: #VU10185

Risk: Low

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5106

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to an error in the Developer Tools. A remote attacker can route style editor traffic through a service worker hosted on a third party website, bypass cross-origin restrictions via Developer Tools and obtain arbitrary files.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Information disclosure

EUVDB-ID: #VU10189

Risk: Low

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5107

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local attacker to launch a symlink attack on the target system.

The weakness exists due to an error in the printing process. A local attacker can create a symbolic link from a temporary file to various files on the system, bypass local access protections to read files available.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Information disclosure

EUVDB-ID: #VU10186

Risk: Low

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5108

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to an error in a manually entered Blob URL. A remote attacker can access the Blob URL from a private browsing tab and obtain private information specific to the private browsing context.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Spoofing attack

EUVDB-ID: #VU10191

Risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5111

CWE-ID: CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)

Exploit availability: No

Description

The vulnerability allows a remote attacker to spoof browser address bar.

The vulnerability exists due to unspecified error. A remote attacker can trick the victim into visiting a specially crafted website, use drag and drop operation and spoof the displayed URL in addressbar.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Security restrictions bypass

EUVDB-ID: #VU10197

Risk: Low

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5112

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to the failure to enforce the requirement of the Development Tools panels of an extension to load URLs for the panels as relative URLs from the extension manifest file. A remote attacker can bypass security restrictions and load a URL that it should not be able to access.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Information disclosure

EUVDB-ID: #VU10195

Risk: Low

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5118

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to an error in the Activity Stream page when attempting to create screenshot images through file: URLs from the local file system. A remote attacker can bypass security restrictions and expose local data if combined with another attack that escapes sandbox protections.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Information disclosure

EUVDB-ID: #VU10188

Risk: Low

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5119

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to the displaying of cross-origin content when CORS headers are set to prohibit the loading of cross-origin content by a site. A remote attacker can bypass cross-origin content restrictions in Reader view and gain access to content that should be restricted in reader view.

Mitigation

Update the affected packages

Ubuntu 17.10:
firefox 58.0+build6-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox 58.0+build6-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 58.0+build6-0ubuntu0.14.04.1

Vulnerable software versions

Ubuntu: 14.04 - 17.10

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3544-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###