Kaspersky ID:
KLA10822
Дата обнаружения:
07/06/2016
Обновлено:
22/01/2024

Описание

Multiple serious vulnerabilities have been found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, elevate privileges, cause denial of service, conduct XSS or obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Memory safety bugs can be exploited to run arbitrary code;
  2. Improper parsing of HTML5 fragments can be exploited remotely via specially crafted web content to cause denial of service;
  3. Improper deleting of document object model (DOM) can be exploited via specially crafted table elements created within the editor to cause denial of service;
  4. An unknown vulnerability can be exploited remotely via specially crafted <select> element to spoof the contents of the addressbar;
  5. An unknown vulnerability at ANGLE graphics library can be exploited remotely to cause denial of service (Windows);
  6. An unknown vulnerability can be exploited remotely via specially crafted URI data to bypass of some same-origin policy protections;
  7. No locked for writing files at the Mozilla updater can be exploited locally via a specially crafted application to escalate privileges (Windows);
  8. Improper processing of permission requests can be exploited remotely via specially crafted web page to get permissions, such as for geolocation or microphone access;
  9. An unknown vulnerability can be exploited via specially crafted requests to spoofing, clickjacking and to cause denial of service;
  10. An unknown vulnerability can be exploited via a fingerprinting attack to information disclosure;
  11. Improper mediating of network requests without checking against Content Security Policy (CSP) at Java plugin can be exploited remotely via a specially crafted web site to conduct XSS attack.

Technical details

Vulnerability (2) caused by improper parsing of HTML5 fragments in a foreign context such as under an <svg> node.

Vulnerability (5) caused by improper size checking while writing to an array during some WebGL shader operations.

Vulnerability (6) can be exploited to set location.host value to an arbitrary string.

Vulnerability (7) related to files extracted by the Mozilla updater from a MAR archive. This files are not locked for writing and can be overwritten by other processes while the updater is running.

To exploit vulnerability (8) malicious user has to conduct series of permissions in a short timespan. As result permission notifications can show the icon for the wrong permission request.

Vulnerability (9) can be exploited when paired fullscreen and pointerlock requests are done in combination with closing windows. As result a pointerlock can be created within a fullscreen window without user permission and cannot then be cancelled without terminating the browser.

Vulnerability (10) caused because CSS pseudo-classes can be used by web content to leak information on plugins that are installed but disabled. It can be exploited to disclosure all of the installed plugins.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Связанные продукты

Список CVE

  • CVE-2016-2815
    high
  • CVE-2016-2818
    high
  • CVE-2016-2819
    high
  • CVE-2016-2821
    high
  • CVE-2016-2822
    warning
  • CVE-2016-2824
    high
  • CVE-2016-2825
    warning
  • CVE-2016-2826
    high
  • CVE-2016-2828
    high
  • CVE-2016-2829
    warning
  • CVE-2016-2831
    high
  • CVE-2016-2832
    warning
  • CVE-2016-2833
    warning
  • CVE-2016-2834
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.