KLA10912
Multiple vulnerabilities in Mozilla Firefox
Обновлено: 17/06/2019
Дата обнаружения
13/12/2016
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, execute arbitrary code, possibly cause denial of service, gain priveleges or make code injections.

Below is a complete list of vulnerabilities:

  1. A buffer overflow in SkiaGL can possibly be exploited remotely to cause denial of service;
  2. An unknown vulnerability can be exploited remotely via marquee tags to bypass security restrictions and allow inline JavaScript;
  3. A use-after free vulnerability within WebVR can be exploited remotely with an unknown impact;
  4. Memory corruption while using WebGL functions containing vector constructor with a varying array within libGLES can be exploited remotely and possibly cause denial of service;
  5. Use-after-free vulnerability in Editor while performing manipulations with DOM subtrees can be exploited remotely and possibly cause denial of service;
  6. An unknown vulnerability can be exploited remotely via crafted SVG images and use of data: URLs to bypass security restrictions and obtain sensitive information;
  7. Malicious users can use a JavaScript Map/Set timing attack to find out whether an atom is used in specific contexts by another compartment or zone. This can be performed to obtain sensitive information (for example, usernames embedded in JavaScript code);
  8. Improperly sanitized Data from Pocket Server before execution can result in the possibility of HTML injection and access to Pocket’s messaging API;
  9. Due to improper validation of origin of incoming events received by Pocket extension, malicious users can fire events, inject code and commands;
  10. An HTML injection vulnerability in Mozilla add-ons SDK can be exploited remotely to inject content and scripts into an add-on’s context;
  11. Memory safety bugs can be exploited to execute arbitrary code.

Technical details

Vulnerability (9) does not affect users, who have enabled e10s.

NB: This vulnerability have no public CVSS rating so rating can be changed by the time.

NB: At this moment Mozilla just reserved CVE numbers for these vulnerabilities. Information can be changed soon.

Пораженные продукты

Mozilla Firefox 50.0.2

Решение

Update to the latest version
Download Mozilla Firefox

Первичный источник обнаружения
Mozilla Foundation Security Advisory 2016-94
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

CI 
[?]

SB 
[?]

PE 
[?]

XSS/CSS 
[?]
Связанные продукты
Mozilla Firefox
CVE-IDS
CVE-2016-98999.8Critical
CVE-2016-98956.1High
CVE-2016-98977.5Critical
CVE-2016-98989.8Critical
CVE-2016-99007.5Critical
CVE-2016-99047.5Critical
CVE-2016-98939.8Critical
CVE-2016-99019.8Critical
CVE-2016-99027.5Critical
CVE-2016-98947.5Critical
CVE-2016-98968.1Critical
CVE-2016-99036.1High
CVE-2016-90809.8Critical