DIESER SERVICE KANN ÜBERSETZUNGEN VON GOOGLE ENTHALTEN. GOOGLE ÜBERNIMMT KEINERLEI VERANTWORTUNG FÜR DIE ÜBERSETZUNGEN. DARUNTER FÄLLT JEGLICHE VERANTWORTUNG IN BEZUG AUF RICHTIGKEIT UND ZUVERLÄSSIGKEIT SOWIE JEGLICHE STILLSCHWEIGENDEN GEWÄHRLEISTUNGEN DER MARKTGÄNGIGKEIT, NICHT-VERLETZUNG VON RECHTEN DRITTER ODER DER EIGNUNG FÜR EINEN BESTIMMTEN ZWECK.

Die Website von Kaspersky Lab wurde für Ihre Bequemlichkeit mithilfe einer Übersetzungssoftware von Google Translate übersetzt. Es wurden angemessene Bemühungen für die Bereitstellung einer akkuraten Übersetzung unternommen. Bitte beachten Sie, dass automatisierte Übersetzungen nicht perfekt sind und menschliche Übersetzer in keinem Fall ersetzen sollen. Übersetzungen werden den Nutzern der Kaspersky-Lab-Website als Service und "wie sie sind" zur Verfügung gestellt. Die Richtigkeit, Zuverlässigkeit oder Korrektheit jeglicher Übersetzungen aus dem Englischen in eine andere Sprache wird weder ausdrücklich noch stillschweigend garantiert. Einige Inhalte (z. B. Bilder, Videos, Flash, usw.) können aufgrund der Einschränkungen der Übersetzungssoftware möglicherweise nicht inhaltsgetreu übersetzt werden.

KLA10822
Multiple vulnerabilities in Mozilla Firefox and Firefox ESR
Aktualisiert: 03/29/2019
Erkennungsdatum
?
06/07/2016
Schweregrad
?
Kritisch
Beschreibung

Multiple serious vulnerabilities have been found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, elevate privileges, cause denial of service, conduct XSS or obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Memory safety bugs can be exploited to run arbitrary code;
  2. Improper parsing of HTML5 fragments can be exploited remotely via specially crafted web content to cause denial of service;
  3. Improper deleting of document object model (DOM) can be exploited via specially crafted table elements created within the editor to cause denial of service;
  4. An unknown vulnerability can be exploited remotely via specially crafted <select> element to spoof the contents of the addressbar;
  5. An unknown vulnerability at ANGLE graphics library can be exploited remotely to cause denial of service (Windows);
  6. An unknown vulnerability can be exploited remotely via specially crafted URI data to bypass of some same-origin policy protections;
  7. No locked for writing files at the Mozilla updater can be exploited locally via a specially crafted application to escalate privileges (Windows);
  8. Improper processing of permission requests can be exploited remotely via specially crafted web page to get permissions, such as for geolocation or microphone access;
  9. An unknown vulnerability can be exploited via specially crafted requests to spoofing, clickjacking and to cause denial of service;
  10. An unknown vulnerability can be exploited via a fingerprinting attack to information disclosure;
  11. Improper mediating of network requests without checking against Content Security Policy (CSP) at Java plugin can be exploited remotely via a specially crafted web site to conduct XSS attack.

Technical details

Vulnerability (2) caused by improper parsing of HTML5 fragments in a foreign context such as under an <svg> node.

Vulnerability (5) caused by improper size checking while writing to an array during some WebGL shader operations.

Vulnerability (6) can be exploited to set location.host value to an arbitrary string.

Vulnerability (7) related to files extracted by the Mozilla updater from a MAR archive. This files are not locked for writing and can be overwritten by other processes while the updater is running.

To exploit vulnerability (8) malicious user has to conduct series of permissions in a short timespan. As result permission notifications can show the icon for the wrong permission request.

Vulnerability (9) can be exploited when paired fullscreen and pointerlock requests are done in combination with closing windows. As result a pointerlock can be created within a fullscreen window without user permission and cannot then be cancelled without terminating the browser.

Vulnerability (10) caused because CSS pseudo-classes can be used by web content to leak information on plugins that are installed but disabled. It can be exploited to disclosure all of the installed plugins.

Beeinträchtigte Produkte

Mozilla Firefox versions earlier than 47
Mozilla Firefox ESR versions earlier than 45.2

Lösung

Update to the latest version
Get Firefox ESR
Get Firefox

Ursprüngliche Informationshinweise

Mozilla Foundation Security Advisory 2016-50
Mozilla Foundation Security Advisory 2016-49
Mozilla Foundation Security Advisory 2016-55
Mozilla Foundation Security Advisory 2016-57
Mozilla Foundation Security Advisory 2016-56
Mozilla Foundation Security Advisory 2016-59
Mozilla Foundation Security Advisory 2016-58
Mozilla Foundation Security Advisory 2016-54
Mozilla Foundation Security Advisory 2016-60
Mozilla Foundation Security Advisory 2016-61
Mozilla Foundation Security Advisory 2016-53
Mozilla Foundation Security Advisory 2016-52
Mozilla Foundation Security Advisory 2016-51

Folgen
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]

XSS/CSS 
[?]
CVE-IDS
?
CVE-2016-28156.8Critical
CVE-2016-28186.8Critical
CVE-2016-28196.8Critical
CVE-2016-28216.8Critical
CVE-2016-28224.3Critical
CVE-2016-28246.8Critical
CVE-2016-28254.3Critical
CVE-2016-28267.2Critical
CVE-2016-28286.8Critical
CVE-2016-28294.3Critical
CVE-2016-28315.8Critical
CVE-2016-28324.3Critical
CVE-2016-28334.3Critical
CVE-2016-28349.3Critical

Link zum Original