SUSE update for MozillaFirefox



Published: 2024-06-18
Risk High
Patch available YES
Number of vulnerabilities 8
CVE-ID CVE-2024-5688
CVE-2024-5690
CVE-2024-5691
CVE-2024-5692
CVE-2024-5693
CVE-2024-5696
CVE-2024-5700
CVE-2024-5702
CWE-ID CWE-416
CWE-200
CWE-254
CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Desktop Applications Module
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Desktop 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15 SP4 LTSS
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing LTSS 15
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing ESPOS 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Desktop 15 SP4 LTSS
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15 SP3 LTSS
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15 SP2 LTSS
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
Operating systems & Components / Operating system

SUSE Enterprise Storage
Operating systems & Components / Operating system

MozillaFirefox-devel
Operating systems & Components / Operating system package or component

MozillaFirefox-debugsource
Operating systems & Components / Operating system package or component

MozillaFirefox-translations-common
Operating systems & Components / Operating system package or component

MozillaFirefox
Operating systems & Components / Operating system package or component

MozillaFirefox-branding-upstream
Operating systems & Components / Operating system package or component

MozillaFirefox-translations-other
Operating systems & Components / Operating system package or component

MozillaFirefox-debuginfo
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 8 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU91694

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-5688

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error during JavaScript object transplant. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the system.

Mitigation

Update the affected package MozillaFirefox to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP5 - 15-SP6

SUSE Linux Enterprise Real Time 15: SP5 - SP6

openSUSE Leap: 15.5 - 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP6

SUSE Linux Enterprise Server 15: SP2 - SP6

SUSE Linux Enterprise Desktop 15: SP5 - SP6

SUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing LTSS 15: SP3 - SP4

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4

SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing 15: SP2 - SP5

SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Enterprise Storage: 7.1

MozillaFirefox-devel: before 115.12.0-150200.152.140.2

MozillaFirefox-debugsource: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-common: before 115.12.0-150200.152.140.2

MozillaFirefox: before 115.12.0-150200.152.140.2

MozillaFirefox-branding-upstream: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-other: before 115.12.0-150200.152.140.2

MozillaFirefox-debuginfo: before 115.12.0-150200.152.140.2

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242061-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Information disclosure

EUVDB-ID: #VU91695

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-5690

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output about the external protocol handlers. A remote attacker can perform a timing attack and gain access to sensitive information.

Mitigation

Update the affected package MozillaFirefox to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP5 - 15-SP6

SUSE Linux Enterprise Real Time 15: SP5 - SP6

openSUSE Leap: 15.5 - 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP6

SUSE Linux Enterprise Server 15: SP2 - SP6

SUSE Linux Enterprise Desktop 15: SP5 - SP6

SUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing LTSS 15: SP3 - SP4

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4

SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing 15: SP2 - SP5

SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Enterprise Storage: 7.1

MozillaFirefox-devel: before 115.12.0-150200.152.140.2

MozillaFirefox-debugsource: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-common: before 115.12.0-150200.152.140.2

MozillaFirefox: before 115.12.0-150200.152.140.2

MozillaFirefox-branding-upstream: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-other: before 115.12.0-150200.152.140.2

MozillaFirefox-debuginfo: before 115.12.0-150200.152.140.2

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242061-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Security features bypass

EUVDB-ID: #VU91696

Risk: Medium

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-5691

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to an error when handling the X-Frame-Options header. A sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window.

Mitigation

Update the affected package MozillaFirefox to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP5 - 15-SP6

SUSE Linux Enterprise Real Time 15: SP5 - SP6

openSUSE Leap: 15.5 - 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP6

SUSE Linux Enterprise Server 15: SP2 - SP6

SUSE Linux Enterprise Desktop 15: SP5 - SP6

SUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing LTSS 15: SP3 - SP4

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4

SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing 15: SP2 - SP5

SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Enterprise Storage: 7.1

MozillaFirefox-devel: before 115.12.0-150200.152.140.2

MozillaFirefox-debugsource: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-common: before 115.12.0-150200.152.140.2

MozillaFirefox: before 115.12.0-150200.152.140.2

MozillaFirefox-branding-upstream: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-other: before 115.12.0-150200.152.140.2

MozillaFirefox-debuginfo: before 115.12.0-150200.152.140.2

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242061-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Security features bypass

EUVDB-ID: #VU91732

Risk: Low

CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-5692

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to an error when parsing file names using the Save As functionality on Windows 10. A remote attacker can trick the victim into saving the file with a disallowed extension such as .url by including an invalid character in the extension.

Note, the vulnerability affects only Windows installations of Firefox.

Mitigation

Update the affected package MozillaFirefox to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP5 - 15-SP6

SUSE Linux Enterprise Real Time 15: SP5 - SP6

openSUSE Leap: 15.5 - 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP6

SUSE Linux Enterprise Server 15: SP2 - SP6

SUSE Linux Enterprise Desktop 15: SP5 - SP6

SUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing LTSS 15: SP3 - SP4

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4

SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing 15: SP2 - SP5

SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Enterprise Storage: 7.1

MozillaFirefox-devel: before 115.12.0-150200.152.140.2

MozillaFirefox-debugsource: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-common: before 115.12.0-150200.152.140.2

MozillaFirefox: before 115.12.0-150200.152.140.2

MozillaFirefox-branding-upstream: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-other: before 115.12.0-150200.152.140.2

MozillaFirefox-debuginfo: before 115.12.0-150200.152.140.2

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242061-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Security features bypass

EUVDB-ID: #VU91734

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-5693

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to Offscreen Canvas does not properly track cross-origin tainting. A remote attacker can access image data from another site in violation of same-origin policy.

Mitigation

Update the affected package MozillaFirefox to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP5 - 15-SP6

SUSE Linux Enterprise Real Time 15: SP5 - SP6

openSUSE Leap: 15.5 - 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP6

SUSE Linux Enterprise Server 15: SP2 - SP6

SUSE Linux Enterprise Desktop 15: SP5 - SP6

SUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing LTSS 15: SP3 - SP4

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4

SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing 15: SP2 - SP5

SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Enterprise Storage: 7.1

MozillaFirefox-devel: before 115.12.0-150200.152.140.2

MozillaFirefox-debugsource: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-common: before 115.12.0-150200.152.140.2

MozillaFirefox: before 115.12.0-150200.152.140.2

MozillaFirefox-branding-upstream: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-other: before 115.12.0-150200.152.140.2

MozillaFirefox-debuginfo: before 115.12.0-150200.152.140.2

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242061-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Buffer overflow

EUVDB-ID: #VU91737

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-5696

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing the text in an <input> tag. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package MozillaFirefox to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP5 - 15-SP6

SUSE Linux Enterprise Real Time 15: SP5 - SP6

openSUSE Leap: 15.5 - 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP6

SUSE Linux Enterprise Server 15: SP2 - SP6

SUSE Linux Enterprise Desktop 15: SP5 - SP6

SUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing LTSS 15: SP3 - SP4

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4

SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing 15: SP2 - SP5

SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Enterprise Storage: 7.1

MozillaFirefox-devel: before 115.12.0-150200.152.140.2

MozillaFirefox-debugsource: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-common: before 115.12.0-150200.152.140.2

MozillaFirefox: before 115.12.0-150200.152.140.2

MozillaFirefox-branding-upstream: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-other: before 115.12.0-150200.152.140.2

MozillaFirefox-debuginfo: before 115.12.0-150200.152.140.2

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242061-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Buffer overflow

EUVDB-ID: #VU91738

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-5700

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package MozillaFirefox to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP5 - 15-SP6

SUSE Linux Enterprise Real Time 15: SP5 - SP6

openSUSE Leap: 15.5 - 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP6

SUSE Linux Enterprise Server 15: SP2 - SP6

SUSE Linux Enterprise Desktop 15: SP5 - SP6

SUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing LTSS 15: SP3 - SP4

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4

SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing 15: SP2 - SP5

SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Enterprise Storage: 7.1

MozillaFirefox-devel: before 115.12.0-150200.152.140.2

MozillaFirefox-debugsource: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-common: before 115.12.0-150200.152.140.2

MozillaFirefox: before 115.12.0-150200.152.140.2

MozillaFirefox-branding-upstream: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-other: before 115.12.0-150200.152.140.2

MozillaFirefox-debuginfo: before 115.12.0-150200.152.140.2

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242061-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use-after-free

EUVDB-ID: #VU91693

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-5702

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the networking stack. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the system.

Mitigation

Update the affected package MozillaFirefox to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP5 - 15-SP6

SUSE Linux Enterprise Real Time 15: SP5 - SP6

openSUSE Leap: 15.5 - 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP6

SUSE Linux Enterprise Server 15: SP2 - SP6

SUSE Linux Enterprise Desktop 15: SP5 - SP6

SUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing LTSS 15: SP3 - SP4

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4

SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4

SUSE Linux Enterprise High Performance Computing 15: SP2 - SP5

SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Enterprise Storage: 7.1

MozillaFirefox-devel: before 115.12.0-150200.152.140.2

MozillaFirefox-debugsource: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-common: before 115.12.0-150200.152.140.2

MozillaFirefox: before 115.12.0-150200.152.140.2

MozillaFirefox-branding-upstream: before 115.12.0-150200.152.140.2

MozillaFirefox-translations-other: before 115.12.0-150200.152.140.2

MozillaFirefox-debuginfo: before 115.12.0-150200.152.140.2

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242061-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###