Дата обнаружения
|
02/08/2016 |
Уровень угрозы
|
Critical |
Описание
|
Multiple serious vulnerabilities have been found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, execute arbitrary code, spoof user interface, bypass security restrictions, conduct cross-site scripting or read local files. Below is a complete list of vulnerabilities
Technical details To exploit vulnerability №2 can be exploited via vectors related to Http2Session::Shutdown, SpdySession31::Shutdown, and other vectors. Vulnerability №3 can be exploited via malformed video and Gecko Media Plugin (GMP) sandbox bypass. Vulnerability №4 caused by Heap-based buffer overflow in the nsBidi::BracketData::AddOpening function Vulnerability №5 related to cairo _cairo_surface_get_extents calls that do not properly interact with libav header allocation in FFmpeg 0.10 Vulnerability №8 caused by Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function Vulnerability №10 related to nsXULPopupManager::KeyDown function Vulnerability №11 related to js::PreliminaryObjectArray::sweep function Vulnerability №12 related to WebRTC socket thread Vulnerability №13 related to CanonicalizeXPCOMParticipant function Vulnerability №14 caused by mishandling changes from ‘INPUT type=»password»‘ to ‘INPUT type=»text»‘ within a single Session Manager session Vulnerability №15 can be exploited via packets that trigger incorrect buffer-resize operations during buffering Vulnerability №16 related to process JavaScript event-handler attributes of a MARQUEE element within a sandboxed IFRAME element that lacks the sandbox=»allow-scripts» attribute value Vulnerability №17 related to nsDisplayList::HitTest function that mishandles rendering display transformation Vulnerability №18 related to nsNodeUtils::NativeAnonymousChildListChange function Vulnerability №20 caused by not restricted drag-and-drop (aka dataTransfer) actions for file: URIs Vulnerability №21 can be exploited via left-to-right characters in conjunction with a right-to-left character set. (Android) Vulnerability №22 caused by an improper LINKABLE and URI_SAFE_FOR_UNTRUSTED_CONTENT flags handling. |
Пораженные продукты
|
Firefox versions earlier than 48.0 |
Решение
|
Update to the latest version |
Первичный источник обнаружения
|
Mozilla Foundation Security Advisories page |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
SB
[?]
RLF
[?]
XSS/CSS
[?]
SUI
[?]
|
Связанные продукты
|
Mozilla Firefox Mozilla Firefox ESR |
CVE-IDS
|
CVE-2016-52505.0Critical
CVE-2016-52617.5Critical CVE-2016-28304.3Warning CVE-2016-28356.8High CVE-2016-28366.8High CVE-2016-28376.8High CVE-2016-28386.8High CVE-2016-28394.3Warning CVE-2016-52514.3Warning CVE-2016-52526.8High CVE-2016-52534.7Warning CVE-2016-52547.5Critical CVE-2016-52556.8High CVE-2016-52586.8High CVE-2016-52596.8High CVE-2016-52604.3Warning CVE-2016-52624.3Warning CVE-2016-52636.8High CVE-2016-52646.8High CVE-2016-52654.0Warning CVE-2016-52665.8High CVE-2016-52674.3Warning CVE-2016-52684.3Warning |
Узнай статистику распространения уязвимостей в твоем регионе |