{"id":1788,"date":"2015-12-16T07:35:19","date_gmt":"2015-12-15T22:35:19","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-2833-1-firefox-vulnerabilities\/"},"modified":"2015-12-16T07:35:19","modified_gmt":"2015-12-15T22:35:19","slug":"usn-2833-1-firefox-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-2833-1-firefox-vulnerabilities\/","title":{"rendered":"USN-2833-1: Firefox vulnerabilities"},"content":{"rendered":"<h2>Ubuntu Security Notice USN-2833-1<\/h2>\n<p><em>15th December, 2015<\/em><\/p>\n<h3>firefox vulnerabilities<\/h3>\n<p>A security issue affects these releases of Ubuntu and its<br \/>\n    derivatives:<\/p>\n<ul>\n<li>Ubuntu 15.10<\/li>\n<li>Ubuntu 15.04<\/li>\n<li>Ubuntu 14.04 LTS<\/li>\n<li>Ubuntu 12.04 LTS<\/li>\n<\/ul>\n<h3>Summary<\/h3>\n<p>Firefox could be made to crash or run programs as your login if it<br \/>\nopened a malicious website.\n<\/p>\n<h3>Software description<\/h3>\n<ul>\n<li>firefox<br \/>\n    &#8211; Mozilla Open Source web browser<\/p>\n<\/li>\n<\/ul>\n<h3>Details<\/h3>\n<p>Andrei Vaida, Jesse Ruderman, Bob Clary, Christian Holler, Jesse Ruderman,<br \/>Eric Rahm, Robert Kaiser, Harald Kirschner, and Michael Henretty<br \/>discovered multiple memory safety issues in Firefox. If a user were<br \/>tricked in to opening a specially crafted website, an attacker could<br \/>potentially exploit these to cause a denial of service via application<br \/>crash, or execute arbitrary code with the privileges of the user invoking<br \/>Firefox. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7201\">CVE-2015-7201<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7202\">CVE-2015-7202<\/a>)<\/p>\n<p>Ronald Crane discovered three buffer overflows through code inspection.<br \/>If a user were tricked in to opening a specially crafted website, an<br \/>attacker could potentially exploit these to cause a denial of service via<br \/>application crash, or execute arbitrary code with the privileges of the<br \/>user invoking Firefox. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7203\">CVE-2015-7203<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7220\">CVE-2015-7220<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7221\">CVE-2015-7221<\/a>)<\/p>\n<p>Cajus Pollmeier discovered a crash during javascript variable assignments<br \/>in some circumstances. If a user were tricked in to opening a specially<br \/>crafted website, an attacker could potentially exploit this to execute<br \/>arbitrary code with the privileges of the user invoking Firefox.<br \/>(<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7204\">CVE-2015-7204<\/a>)<\/p>\n<p>Ronald Crane discovered a buffer overflow through code inspection. If a<br \/>user were tricked in to opening a specially crafted website, an attacker<br \/>could potentially exploit this to cause a denial of service via<br \/>application crash, or execute arbitrary code with the privileges of the<br \/>user invoking Firefox. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7205\">CVE-2015-7205<\/a>)<\/p>\n<p>It was discovered that it is possible to read cross-origin URLs following<br \/>a redirect if performance.getEntries() is used with an iframe to host a<br \/>page. If a user were tricked in to opening a specially crafted website, an<br \/>attacker could potentially exploit this to bypass same-origin<br \/>restrictions. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7207\">CVE-2015-7207<\/a>)<\/p>\n<p>It was discovered that Firefox allows for control characters to be set in<br \/>cookies. An attacker could potentially exploit this to conduct cookie<br \/>injection attacks on some web servers. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7208\">CVE-2015-7208<\/a>)<\/p>\n<p>Looben Yang discovered a use-after-free in WebRTC when closing channels in<br \/>some circumstances. If a user were tricked in to opening a specially<br \/>crafted website, an attacker could potentially exploit this to cause a<br \/>denial of service via application crash, or execute arbitrary code with<br \/>the privileges of the user invoking Firefox. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7210\">CVE-2015-7210<\/a>)<\/p>\n<p>Abdulrahman Alqabandi discovered that hash symbol is incorrectly handled<br \/>when parsing data: URLs. An attacker could potentially exploit this to<br \/>conduct URL spoofing attacks. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7211\">CVE-2015-7211<\/a>)<\/p>\n<p>Abhishek Arya discovered an integer overflow when allocating large<br \/>textures. If a user were tricked in to opening a specially crafted<br \/>website, an attacker could potentially exploit this to cause a denial of<br \/>service via application crash, or execute arbitrary code with the<br \/>privileges of the user invoking Firefox. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7212\">CVE-2015-7212<\/a>)<\/p>\n<p>Ronald Crane dicovered an integer overflow when processing MP4 format<br \/>video in some circumstances. If a user were tricked in to opening a<br \/>specially crafted website, an attacker could potentially exploit this to<br \/>cause a denial of service via application crash, or execute arbitrary code<br \/>with the privileges of the user invoking Firefox. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7213\">CVE-2015-7213<\/a>)<\/p>\n<p>Tsubasa Iinuma discovered a way to bypass same-origin restrictions using<br \/>data: and view-source: URLs. If a user were tricked in to opening a<br \/>specially crafted website, an attacker could potentially exploit this to<br \/>obtain sensitive information and read local files. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7214\">CVE-2015-7214<\/a>)<\/p>\n<p>Masato Kinugawa discovered a cross-origin information leak in error events<br \/>in web workers. An attacker could potentially exploit this to obtain<br \/>sensitive information. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7215\">CVE-2015-7215<\/a>)<\/p>\n<p>Gustavo Grieco discovered that the file chooser crashed on malformed<br \/>images due to flaws in the Jasper library. If a user were tricked in to<br \/>opening a specially crafted website, an attacker could potentially<br \/>exploit this to cause a denial of service.<br \/>(<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7216\">CVE-2015-7216<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7217\">CVE-2015-7217<\/a>)<\/p>\n<p>Stuart Larsen discoverd two integer underflows when handling malformed<br \/>HTTP\/2 frames in some circumstances. If a user were tricked in to opening<br \/>a specially crafted website, an attacker could potentially exploit these<br \/>to cause a denial of service via application crash. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7218\">CVE-2015-7218<\/a>,<br \/><a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7219\">CVE-2015-7219<\/a>)<\/p>\n<p>Gerald Squelart discovered an integer underflow in the libstagefright<br \/>library when parsing MP4 format video in some circumstances. If a user<br \/>were tricked in to opening a specially crafted website, an attacker could<br \/>potentially exploit this to cause a denial of service via application<br \/>crash, or execute arbitrary code with the privileges of the user invoking<br \/>Firefox. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7222\">CVE-2015-7222<\/a>)<\/p>\n<p>Kris Maglione discovered a mechanism where web content could use<br \/>WebExtension APIs to execute code with the privileges of a particular<br \/>WebExtension. If a user were tricked in to opening a specially crafted<br \/>website with a vulnerable extension installed, an attacker could<br \/>potentially exploit this to obtain sensitive information or conduct<br \/>cross-site scripting (XSS) attacks. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7223\">CVE-2015-7223<\/a>)<\/p>\n<h3>Update instructions<\/h3>\n<p> The problem can be corrected by updating your system to the following<br \/>\npackage version:<\/p>\n<dl>\n<dt>Ubuntu 15.10:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\">firefox<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\/43.0+build1-0ubuntu0.15.10.1\">43.0+build1-0ubuntu0.15.10.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 15.04:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\">firefox<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\/43.0+build1-0ubuntu0.15.04.1\">43.0+build1-0ubuntu0.15.04.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 14.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\">firefox<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\/43.0+build1-0ubuntu0.14.04.1\">43.0+build1-0ubuntu0.14.04.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 12.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\">firefox<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\/43.0+build1-0ubuntu0.12.04.1\">43.0+build1-0ubuntu0.12.04.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions:<br \/>\n<a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.\n<\/p>\n<p>After a standard system update you need to restart Firefox to make<br \/>all the necessary changes.<\/p>\n<h3>References<\/h3>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7201\">CVE-2015-7201<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7202\">CVE-2015-7202<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7203\">CVE-2015-7203<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7204\">CVE-2015-7204<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7205\">CVE-2015-7205<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7207\">CVE-2015-7207<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7208\">CVE-2015-7208<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7210\">CVE-2015-7210<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7211\">CVE-2015-7211<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7212\">CVE-2015-7212<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7213\">CVE-2015-7213<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7214\">CVE-2015-7214<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7215\">CVE-2015-7215<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7216\">CVE-2015-7216<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7217\">CVE-2015-7217<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7218\">CVE-2015-7218<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7219\">CVE-2015-7219<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7220\">CVE-2015-7220<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7221\">CVE-2015-7221<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7222\">CVE-2015-7222<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2015-7223\">CVE-2015-7223<\/a><\/p>\n<p>Source: ubuntu-usn<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Ubuntu Security Notice USN-2833-1 15th December, 2015 firefox vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.10 Ubuntu 15.04 Ubuntu 14.04 LTS Ubuntu 12.04 LTS Summary Firefox could be made to crash or run programs as your login if it opened a malicious website. Software description firefox &#8211; Mozilla Open Source web browser Details Andrei Vaida, Jesse Ruderman, Bob Clary, Christian Holler, Jesse Ruderman,Eric Rahm, Robert Kaiser, Harald Kirschner, and Michael Henrettydiscovered multiple memory safety issues in Firefox. If a user weretricked in to opening a specially crafted website, an attacker couldpotentially exploit these to cause a denial of service via applicationcrash, or execute arbitrary code with the privileges of the user invokingFirefox. (CVE-2015-7201, CVE-2015-7202) Ronald Crane discovered three buffer overflows through code inspection.If a user were tricked in to opening a specially crafted website, <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-2833-1-firefox-vulnerabilities\/\" title=\"USN-2833-1: Firefox vulnerabilities\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-1788","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/1788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=1788"}],"version-history":[{"count":0,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/1788\/revisions"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=1788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=1788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=1788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}