SB2018031514 - Red Hat update for Mozilla Firefox
Published: March 15, 2018
Security Bulletin ID
SB2018031514
Severity
High
Patch available
YES
Number of vulnerabilities
7
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2018-5125)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
2) Buffer overflow (CVE-ID: CVE-2018-5127)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to buffer overflow when manipulating the SVg animatedPathSegList through script. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
3) Out-of-bounds write (CVE-ID: CVE-2018-5129)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to a lack of parameter validation on IPC messages. A remote attacker can supply specially crafted malformed IPC messages, trigger out-of-bounds write, escape sandbox and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
4) Memory corruption (CVE-ID: CVE-2018-5130)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to a lack of parameter validation on IPC messages. A remote attacker can send packets with a mismatched RTP payload type in WebRTC connections, trigger memory corruption and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
5) Information disclosure (CVE-ID: CVE-2018-5131)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to the fetch() API can return transient local copies of resources that were sent with a no-store or no-cache cache header instead of downloading a copy from the network as it should. A remote attacker can share a common profile while browsing and access previously stored, locally cached data of a website.
6) Integer overflow (CVE-ID: CVE-2018-5144)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to integer overflow during conversion of text to some Unicode character sets. A remote attacker can supply unchecked length parameter, trigger overflow and cause the service to crash.
7) Memory corruption (CVE-ID: CVE-2018-5145)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.