Kaspersky ID:
KLA11109
Detect Date:
09/28/2017
Updated:
01/22/2024

Description

Multiple serious vulnerabilities have been found in Firefox and Firefox ESR. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, bypass security restrictions, obtain sensitive information and perform cross-site scripting.

Below is complete list of vulnerabilities:

  1. A use-after-free vulnerability related to Fetch API can be exploited remotely to cause denial of service;
  2. A use-after-free vulnerability related to Accessible Rich Internet Applications (ARIA) elements can be exploited remotely to cause denial of service;
  3. A use-after-free vulnerability can be exploited to cause denial of service;
  4. A buffer overflow vulnerability related to ANGLE graphics library can be exploited to cause denial of service;
  5. A use-after-free vulnerability related to TLS 1.2 d can be exploited remotely to cause denial of service;
  6. A vulnerability related to blob: and data: URLs can be exploited remotely to bypass security restrictions;
  7. A vulnerability related to rendering of some OS X fonts can be exploited remotely to bypass security restrictions;
  8. A vulnerability related to the content security policy (CSP) sandbox directive can be exploited remotely to perform cross-site scripting;
  9. Multiple memory corruption vulnerabilities which occur because of memory safety bugs can be exploited remotely to execute arbitrary code;
  10. An unspecified vulnerability can be exploited remotely to spoof user interface;
  11. A vulnerability related to Drag & Drop Feature can be exploited remotely via specially designed page content to read local files;
  12. A vulnerability related to JavaScript parser can be potentially exploited to cause denial of service or obtain sensitive information;
  13. An unspecified vulnerability in the data: protocol can be exploited remotely via pages containing an iframe to spoof user interface;
  14. A multiple vulnerabilities related to WebExtension loading can be exploited to bypass security restrictions;
  15. A vulnerability related to the AES-GCM implementation in WebCrypto API can be exploited remotely to obtain sensitive information;
  16. A vulnerability related to Xray wrapper mechanism can be exploited remotely to spoof user interface.

Technical details

Vulnerability (2) only affects Firefox for Android. Other operating systems are not affected.

Vulnerability (3) occurs in design mode while resizing images.

Vulnerability (7) only affects OS X operating system. Other operating systems are not affected.

Vulnerability (14) only affects Firefox for Android. Other operating systems are not affected.

Vulnerability (15) only affects installations with e10 multiprocess turned off.

Vulnerabilities 1-9 are related to Mozilla Firefox ESR.

All vulnerabilities are related to Mozilla Firefox.

NB: Not every vulnerability already has CVSS rating, so cumulative CVSS rating can be not representative.

NB: This vulnerability does not have any public CVSS rating, so rating can be changed by the time.

NB: At this moment Mozilla has just reserved CVE numbers for these vulnerabilities. Information can be changed soon.

Original advisories

Related products

CVE list

  • CVE-2017-7793
    critical
  • CVE-2017-7818
    critical
  • CVE-2017-7819
    critical
  • CVE-2017-7824
    critical
  • CVE-2017-7805
    warning
  • CVE-2017-7814
    high
  • CVE-2017-7825
    warning
  • CVE-2017-7823
    warning
  • CVE-2017-7810
    critical
  • CVE-2017-7817
    warning
  • CVE-2017-7812
    warning
  • CVE-2017-7813
    high
  • CVE-2017-7815
    warning
  • CVE-2017-7816
    warning
  • CVE-2017-7821
    critical
  • CVE-2017-7822
    warning
  • CVE-2017-7820
    warning
  • CVE-2017-7811
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.