Description
Multiple serious vulnerabilities have been found in Firefox and Firefox ESR. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, bypass security restrictions, obtain sensitive information and perform cross-site scripting.
Below is complete list of vulnerabilities:
- A use-after-free vulnerability related to Fetch API can be exploited remotely to cause denial of service;
- A use-after-free vulnerability related to Accessible Rich Internet Applications (ARIA) elements can be exploited remotely to cause denial of service;
- A use-after-free vulnerability can be exploited to cause denial of service;
- A buffer overflow vulnerability related to ANGLE graphics library can be exploited to cause denial of service;
- A use-after-free vulnerability related to TLS 1.2 d can be exploited remotely to cause denial of service;
- A vulnerability related to blob: and data: URLs can be exploited remotely to bypass security restrictions;
- A vulnerability related to rendering of some OS X fonts can be exploited remotely to bypass security restrictions;
- A vulnerability related to the content security policy (CSP) sandbox directive can be exploited remotely to perform cross-site scripting;
- Multiple memory corruption vulnerabilities which occur because of memory safety bugs can be exploited remotely to execute arbitrary code;
- An unspecified vulnerability can be exploited remotely to spoof user interface;
- A vulnerability related to Drag & Drop Feature can be exploited remotely via specially designed page content to read local files;
- A vulnerability related to JavaScript parser can be potentially exploited to cause denial of service or obtain sensitive information;
- An unspecified vulnerability in the data: protocol can be exploited remotely via pages containing an iframe to spoof user interface;
- A multiple vulnerabilities related to WebExtension loading can be exploited to bypass security restrictions;
- A vulnerability related to the AES-GCM implementation in WebCrypto API can be exploited remotely to obtain sensitive information;
- A vulnerability related to Xray wrapper mechanism can be exploited remotely to spoof user interface.
Technical details
Vulnerability (2) only affects Firefox for Android. Other operating systems are not affected.
Vulnerability (3) occurs in design mode while resizing images.
Vulnerability (7) only affects OS X operating system. Other operating systems are not affected.
Vulnerability (14) only affects Firefox for Android. Other operating systems are not affected.
Vulnerability (15) only affects installations with e10 multiprocess turned off.
Vulnerabilities 1-9 are related to Mozilla Firefox ESR.
All vulnerabilities are related to Mozilla Firefox.
NB: Not every vulnerability already has CVSS rating, so cumulative CVSS rating can be not representative.
NB: This vulnerability does not have any public CVSS rating, so rating can be changed by the time.
NB: At this moment Mozilla has just reserved CVE numbers for these vulnerabilities. Information can be changed soon.
Original advisories
Related products
CVE list
- CVE-2017-7793 critical
- CVE-2017-7818 critical
- CVE-2017-7819 critical
- CVE-2017-7824 critical
- CVE-2017-7805 warning
- CVE-2017-7814 high
- CVE-2017-7825 warning
- CVE-2017-7823 warning
- CVE-2017-7810 critical
- CVE-2017-7817 warning
- CVE-2017-7812 warning
- CVE-2017-7813 high
- CVE-2017-7815 warning
- CVE-2017-7816 warning
- CVE-2017-7821 critical
- CVE-2017-7822 warning
- CVE-2017-7820 warning
- CVE-2017-7811 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com