{"id":15697,"date":"2017-04-22T02:34:16","date_gmt":"2017-04-21T17:34:16","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-3260-1-firefox-vulnerabilities\/"},"modified":"2017-04-22T02:34:16","modified_gmt":"2017-04-21T17:34:16","slug":"usn-3260-1-firefox-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-3260-1-firefox-vulnerabilities\/","title":{"rendered":"USN-3260-1: Firefox vulnerabilities"},"content":{"rendered":"<p>USN-3260-1: Firefox vulnerabilities<\/p>\n<h2>Ubuntu Security Notice USN-3260-1<\/h2>\n<p><em>21st April, 2017<\/em><\/p>\n<h3>firefox vulnerabilities<\/h3>\n<p>A security issue affects these releases of Ubuntu and its<br \/>\n    derivatives:<\/p>\n<ul>\n<li>Ubuntu 17.04<\/li>\n<li>Ubuntu 16.10<\/li>\n<li>Ubuntu 16.04 LTS<\/li>\n<li>Ubuntu 14.04 LTS<\/li>\n<\/ul>\n<h3>Summary<\/h3>\n<p>Firefox could be made to crash or run programs as your login if it<br \/>\nopened a malicious website.\n<\/p>\n<h3>Software description<\/h3>\n<ul>\n<li>firefox<br \/>\n    &#8211; Mozilla Open Source web browser<\/p>\n<\/li>\n<\/ul>\n<h3>Details<\/h3>\n<p>Multiple security issues were discovered in Firefox. If a user were<br \/>tricked in to opening a specially crafted website, an attacker could<br \/>potentially exploit these to read uninitialized memory, obtain sensitive<br \/>information, spoof the addressbar contents or other UI elements, escape<br \/>the sandbox to read local files, conduct cross-site scripting (XSS)<br \/>attacks, cause a denial of service via application crash, or execute<br \/>arbitrary code. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5429\">CVE-2017-5429<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5430\">CVE-2017-5430<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5432\">CVE-2017-5432<\/a>,<br \/><a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5433\">CVE-2017-5433<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5434\">CVE-2017-5434<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5435\">CVE-2017-5435<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5436\">CVE-2017-5436<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5437\">CVE-2017-5437<\/a>,<br \/><a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5438\">CVE-2017-5438<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5439\">CVE-2017-5439<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5440\">CVE-2017-5440<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5441\">CVE-2017-5441<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5442\">CVE-2017-5442<\/a>,<br \/><a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5443\">CVE-2017-5443<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5444\">CVE-2017-5444<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5445\">CVE-2017-5445<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5446\">CVE-2017-5446<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5447\">CVE-2017-5447<\/a>,<br \/><a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5448\">CVE-2017-5448<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5449\">CVE-2017-5449<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5451\">CVE-2017-5451<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5453\">CVE-2017-5453<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5454\">CVE-2017-5454<\/a>,<br \/><a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5455\">CVE-2017-5455<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5456\">CVE-2017-5456<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5458\">CVE-2017-5458<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5459\">CVE-2017-5459<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5460\">CVE-2017-5460<\/a>,<br \/><a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5461\">CVE-2017-5461<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5464\">CVE-2017-5464<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5465\">CVE-2017-5465<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5466\">CVE-2017-5466<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5467\">CVE-2017-5467<\/a>,<br \/><a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5468\">CVE-2017-5468<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5469\">CVE-2017-5469<\/a>)<\/p>\n<p>A flaw was discovered in the DRBG number generation in NSS. If an<br \/>attacker were able to perform a man-in-the-middle attack, this flaw<br \/>could potentially be exploited to view sensitive information.<br \/>(<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5462\">CVE-2017-5462<\/a>)<\/p>\n<h3>Update instructions<\/h3>\n<p> The problem can be corrected by updating your system to the following<br \/>\npackage version:<\/p>\n<dl>\n<dt>Ubuntu 17.04:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\">firefox<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\/53.0+build6-0ubuntu0.17.04.1\">53.0+build6-0ubuntu0.17.04.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 16.10:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\">firefox<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\/53.0+build6-0ubuntu0.16.10.1\">53.0+build6-0ubuntu0.16.10.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 16.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\">firefox<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\/53.0+build6-0ubuntu0.16.04.1\">53.0+build6-0ubuntu0.16.04.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 14.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\">firefox<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\/53.0+build6-0ubuntu0.14.04.1\">53.0+build6-0ubuntu0.14.04.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions:<br \/>\n<a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.\n<\/p>\n<p>After a standard system update you need to restart Firefox to make<br \/>all the necessary changes.<\/p>\n<h3>References<\/h3>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5429\">CVE-2017-5429<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5430\">CVE-2017-5430<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5432\">CVE-2017-5432<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5433\">CVE-2017-5433<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5434\">CVE-2017-5434<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5435\">CVE-2017-5435<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5436\">CVE-2017-5436<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5437\">CVE-2017-5437<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5438\">CVE-2017-5438<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5439\">CVE-2017-5439<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5440\">CVE-2017-5440<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5441\">CVE-2017-5441<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5442\">CVE-2017-5442<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5443\">CVE-2017-5443<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5444\">CVE-2017-5444<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5445\">CVE-2017-5445<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5446\">CVE-2017-5446<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5447\">CVE-2017-5447<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5448\">CVE-2017-5448<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5449\">CVE-2017-5449<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5451\">CVE-2017-5451<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5453\">CVE-2017-5453<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5454\">CVE-2017-5454<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5455\">CVE-2017-5455<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5456\">CVE-2017-5456<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5458\">CVE-2017-5458<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5459\">CVE-2017-5459<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5460\">CVE-2017-5460<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5461\">CVE-2017-5461<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5462\">CVE-2017-5462<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5464\">CVE-2017-5464<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5465\">CVE-2017-5465<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5466\">CVE-2017-5466<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5467\">CVE-2017-5467<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5468\">CVE-2017-5468<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5469\">CVE-2017-5469<\/a><\/p>\n<p>Source: <a href=\"http:\/\/www.ubuntu.com\/usn\/usn-3260-1\/\" target=\"_blank\">USN-3260-1: Firefox vulnerabilities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-3260-1: Firefox vulnerabilities Ubuntu Security Notice USN-3260-1 21st April, 2017 firefox vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 17.04 Ubuntu 16.10 Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary Firefox could be made to crash or run programs as your login if it opened a malicious website. Software description firefox &#8211; Mozilla Open Source web browser Details Multiple security issues were discovered in Firefox. If a user weretricked in to opening a specially crafted website, an attacker couldpotentially exploit these to read uninitialized memory, obtain sensitiveinformation, spoof the addressbar contents or other UI elements, escapethe sandbox to read local files, conduct cross-site scripting (XSS)attacks, cause a denial of service via application crash, or executearbitrary code. (CVE-2017-5429, CVE-2017-5430, CVE-2017-5432,CVE-2017-5433, CVE-2017-5434, CVE-2017-5435, CVE-2017-5436, CVE-2017-5437,CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442,CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446, CVE-2017-5447,CVE-2017-5448, CVE-2017-5449, CVE-2017-5451, CVE-2017-5453, CVE-2017-5454,CVE-2017-5455, CVE-2017-5456, <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-3260-1-firefox-vulnerabilities\/\" title=\"USN-3260-1: Firefox vulnerabilities\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-15697","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/15697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=15697"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/15697\/revisions"}],"predecessor-version":[{"id":15698,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/15697\/revisions\/15698"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=15697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=15697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=15697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}