SB2018090602 - Multiple vulnerabilities in Mozilla Firefox
Published: September 6, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 9 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2018-12377)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Use-after-free (CVE-ID: CVE-2018-12378)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Out-of-bounds write (CVE-ID: CVE-2018-12379)
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to out-of-bounds write when the Mozilla Updater opens a MAR format file which contains a very long item filename. A local attacker can run the Mozilla Updater on the local system with the malicious MAR file, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Security restrictions bypass (CVE-ID: CVE-2017-16541)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to content can be loaded from the mounted file system directly using a file: URI. A remote unauthenticated attacker can use the automount feature with autofs to create a mount point on the local file system and bypass browser proxy settings.
5) Security restrictions bypass (CVE-ID: CVE-2018-12381)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to an error when the message's mail columns are incorrectly interpreted as a URL. A remote unauthenticated attacker can drag and drop an Outlook email message into the browser and trigger a page navigation.
6) Spoofing attack (CVE-ID: CVE-2018-12382)
The vulnerability allows a remote attacker to conduct spoofing attack on the target system.
The vulnerability exists due to an error when scrolling the loaded domain out of view to the right. A remote unauthenticated attacker can use a javascript: URI in concert with JavaScript to insert text before the loaded domain name and spoof the displayed addressbar URL on Firefox for Android.
7) Information disclosure (CVE-ID: CVE-2018-12383)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to the older stored password file was not deleted when the data was copied to a new format starting. A remote unauthenticated attacker can access stored password data.
8) Memory corruption (CVE-ID: CVE-2018-12375)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when handling malicious input. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
9) Memory corruption (CVE-ID: CVE-2018-12376)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when handling malicious input. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.