DIESER SERVICE KANN ÜBERSETZUNGEN VON GOOGLE ENTHALTEN. GOOGLE ÜBERNIMMT KEINERLEI VERANTWORTUNG FÜR DIE ÜBERSETZUNGEN. DARUNTER FÄLLT JEGLICHE VERANTWORTUNG IN BEZUG AUF RICHTIGKEIT UND ZUVERLÄSSIGKEIT SOWIE JEGLICHE STILLSCHWEIGENDEN GEWÄHRLEISTUNGEN DER MARKTGÄNGIGKEIT, NICHT-VERLETZUNG VON RECHTEN DRITTER ODER DER EIGNUNG FÜR EINEN BESTIMMTEN ZWECK.

Die Website von Kaspersky Lab wurde für Ihre Bequemlichkeit mithilfe einer Übersetzungssoftware von Google Translate übersetzt. Es wurden angemessene Bemühungen für die Bereitstellung einer akkuraten Übersetzung unternommen. Bitte beachten Sie, dass automatisierte Übersetzungen nicht perfekt sind und menschliche Übersetzer in keinem Fall ersetzen sollen. Übersetzungen werden den Nutzern der Kaspersky-Lab-Website als Service und "wie sie sind" zur Verfügung gestellt. Die Richtigkeit, Zuverlässigkeit oder Korrektheit jeglicher Übersetzungen aus dem Englischen in eine andere Sprache wird weder ausdrücklich noch stillschweigend garantiert. Einige Inhalte (z. B. Bilder, Videos, Flash, usw.) können aufgrund der Einschränkungen der Übersetzungssoftware möglicherweise nicht inhaltsgetreu übersetzt werden.

KLA10795
Multiple vulnerabilities in Mozilla Firefox and Firefox ESR
Aktualisiert: 03/29/2019
Erkennungsdatum
?
04/26/2016
Schweregrad
?
Kritisch
Beschreibung

Multiple serious vulnerabilities have been found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to bypass security restrictions, inject arbitrary code, elevate privileges, cause denial of service or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Memory safety bugs can be exploited to run arbitrary code;
  2. Mozilla Maintenance Service updater can be exploited locally via specially crafted file to delete arbitrary files and possibly to escalate privileges; (Windows)
  3. An unknown vulnerability in Firefox for Android can be exploited remotely via previously installed malicious application to obtain sensitive information; (Android versions earlier than 5.0)
  4. Improper objects handling in Service Workers can be exploited to cause denial of service or other unknown impacts;
  5. An unknown vulnerability in Service Workers can be exploited via buffer overflow to cause a denial of service;
  6. Unauthorized access to orientation data and motion sensors in Firefox for Android can be exploited via specially crafted JavaScript code to disclosure of user actions; (Android)
  7. Improper handling of sizes can be exploited remotely via specially crafted web content to cause a denial of service;
  8. Improper Content Security Policy (CSP) applying to web content can be exploited to conduct XSS attack via a crafted web site;
  9. An unknown vulnerability in API for web extensions can be exploited remotely via specially crafted web extension to conduct XSS and to inject content into legitimate extensions;
  10. An unknown vulnerability can be exploited remotely via specially crafted malicious page to arbitrary code execution;
  11. Improper events processing in the Firefox Health Report can be exploited via specially crafted content document for the remote-report iframe to inject web content into the Firefox Health Report iframe;

Technical details

Vulnerability (2) caused by Mozilla Maintenance Service privileged system access.

Vulnerability (3) allows malicious user access content provider permissions for Firefox in order to read data includes browser history and locally saved passwords. It occurs when a list of permissions is defined to match those that Firefox uses for content providers and bypasses signature protections.

Vulnerability (4) caused by keeping active ServiceWorkerInfo object after its registration finishing. We’ll get use-after-free as result.

Vulnerability (5) caused by race condition in the ServiceWorkerManager.

Vulnerability (7) caused by improper handling of CENC offsets and the sizes tables in the libstagefright library. It can be exploited through the buffer overflow.

Vulnerability (8) caused by sending CSP with the multipart/x-mixed-replace MIME type.

Vulnerability (9) related to chrome.tabs.update API and allows navigation to JavaScript URLs without additional permissions. It is possible to inject content into legitimate extensions if they load content within browser tabs.

Vulnerability (10) related to JavaScript .watch() method which could be used to overflow the 32-bit generation count of the underlying HashMap. As result we’ll get write to an invalid entry. The overflow require a user to keep a malicious page open for the duration of the attack.

Vulnerability (11) allows attacker to change the sharing preferences of a user by firing the appropriate events at its containing page.

Beeinträchtigte Produkte

Mozilla Firefox versions earlier than 46
Mozilla Firefox ESR versions earlier than 38.8  
Mozilla Firefox ESR 45 versions earlier than 45.1

Lösung

Update to the latest version
Get Firefox
Get Firefox ESR

Ursprüngliche Informationshinweise

Mozilla Foundation Advisories

Folgen
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

CI 
[?]

PE 
[?]
CVE-IDS
?
CVE-2016-28085.1Critical
CVE-2016-28204.3Critical
CVE-2016-28174.3Critical
CVE-2016-28164.3Critical
CVE-2016-28146.8Critical
CVE-2016-28134.3Critical
CVE-2016-28125.1Critical
CVE-2016-28116.8Critical
CVE-2016-28104.3Critical
CVE-2016-28095.8Critical
CVE-2016-17804.3Critical
CVE-2016-280710.0Critical
CVE-2016-280610.0Critical
CVE-2016-280510.0Critical
CVE-2016-280410.0Critical

Link zum Original