Multiple vulnerabilities in Mozilla Firefox



Published: 2017-04-19 | Updated: 2017-08-23
Risk High
Patch available YES
Number of vulnerabilities 41
CVE-ID CVE-2017-5433
CVE-2017-5435
CVE-2017-5436
CVE-2017-5461
CVE-2017-5459
CVE-2017-5466
CVE-2017-5434
CVE-2017-5432
CVE-2017-5460
CVE-2017-5438
CVE-2017-5439
CVE-2017-5440
CVE-2017-5441
CVE-2017-5464
CVE-2017-5443
CVE-2017-5444
CVE-2017-5446
CVE-2017-5447
CVE-2017-5465
CVE-2017-5448
CVE-2017-5454
CVE-2017-5455
CVE-2017-5456
CVE-2017-5445
CVE-2017-5449
CVE-2017-5450
CVE-2017-5462
CVE-2017-5463
CVE-2017-5467
CVE-2017-5452
CVE-2017-5453
CVE-2017-5458
CVE-2017-5468
CVE-2017-5430
CVE-2017-5429
CVE-2017-5437
CVE-2016-10197
CVE-2016-10196
CVE-2016-10195
CVE-2017-5469
CVE-2016-6354
CVE-2017-5442
CVE-2017-5451
CWE-ID CWE-416
CWE-787
CWE-119
CWE-79
CWE-125
CWE-265
CWE-200
CWE-20
CWE-121
CWE-122
Exploitation vector Network
Public exploit Public exploit code for vulnerability #18 is available.
Public exploit code for vulnerability #19 is available.
Vulnerable software
Subscribe
Mozilla Firefox
Client/Desktop applications / Web browsers

Firefox ESR
Client/Desktop applications / Web browsers

Vendor Mozilla

Security Bulletin

This security bulletin contains information about 41 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU6313

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5433

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error in SMIL animation functions, when pointers to animation elements in an array are dropped from the animation controller while still in use. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use-after-free

EUVDB-ID: #VU6314

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5435

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error during transaction processing in the editor during design mode interactions. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Out-of-bounds write

EUVDB-ID: #VU6315

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5436

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error in the Graphite 2 library when processing Graphite fonts. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds write

EUVDB-ID: #VU6316

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5461

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error during Base64 decoding operation in the Network Security Services (NSS) library. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Buffer overflow

EUVDB-ID: #VU6317

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5459

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in WebGL implementation. A remote attacker can trigger buffer overflow and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Cross-site scripting

EUVDB-ID: #VU6318

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5466

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform XSS attacks.

The vulnerability exists due to origin confusion when reloading isolated data:text/html URL. If a page is loaded from an original site through a hyperlink and contains a redirect to a data:text/html URL, triggering a reload will run the reloaded data:text/html page with its origin set incorrectly.

Successful exploitation of this vulnerability may allow an attacker to gain access to potentially sensitive information from another domain.

Mitigation

Update to Firefox 53 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 52.0 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use-after-free

EUVDB-ID: #VU6319

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5434

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error when redirecting focus handling. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use-after-free

EUVDB-ID: #VU6320

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5432

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error during certain text input selection. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Use-after-free

EUVDB-ID: #VU6321

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5460

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error in frame selection triggered by a combination of malicious script content and key presses by a user. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU6322

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5438

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error during XSLT processing due to the result handler being held by a freed handler during handling. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use-after-free

EUVDB-ID: #VU6323

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5439

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error during XSLT processing due to poor handling of template parameters. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Use-after-free

EUVDB-ID: #VU6324

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5440

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Use-after-free

EUVDB-ID: #VU6325

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5441

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error when holding a selection during scroll events. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Memory corruption

EUVDB-ID: #VU6326

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5464

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to memory corruption during DOM manipulations of the accessibility tree through script. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Out-of-bounds write

EUVDB-ID: #VU6327

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5443

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error while decoding improperly formed BinHex format archives. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Buffer overflow

EUVDB-ID: #VU6328

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5444

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error while parsing application/http-index-format format content when the header contains improperly formatted data. A remote attacker can trigger buffer overflow and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Out-of-bounds read

EUVDB-ID: #VU6329

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5446

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when an HTTP/2 connection to a servers sends DATA frames with incorrect data content. A remote attacker can trigger out-of-bounds read and gain access to sensitive system memory.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Out-of-bounds read

EUVDB-ID: #VU6330

Risk: High

CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2017-5447

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when processing glyph widths during text layout. A remote attacker can trigger out-of-bounds read and gain access to sensitive system memory.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

19) Out-of-bounds read

EUVDB-ID: #VU6331

Risk: High

CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2017-5465

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error while processing SVG content in ConvolvePixel. A remote attacker can trigger out-of-bounds read and gain access to sensitive system memory.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

20) Out-of-bounds write

EUVDB-ID: #VU6332

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5448

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error in ClearKeyDecryptor while decrypting some Clearkey-encrypted media content. The ClearKeyDecryptor code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
http://www.zerodayinitiative.com/advisories/ZDI-17-320/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Sendbox bypass

EUVDB-ID: #VU6333

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5454

CWE-ID: CWE-265 - Privilege / Sandbox Issues

Exploit availability: No

Description

The vulnerability allows a remote attacker to read files from local filesystem.

The vulnerability exists due to an error in sendbox implementation. A remote attacker can use the file picker to access different files than those selected in the file picker through the use of relative paths.

Successful exploitation of the vulnerability may allow an attacker to read arbitrary files from the vulnerable system.

Mitigation

Update to Firefox 53 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 52.0 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Sendbox bypass

EUVDB-ID: #VU6334

Risk: High

CVSSv3.1: 6.2 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5455

CWE-ID: CWE-265 - Privilege / Sandbox Issues

Exploit availability: No

Description

The vulnerability allows a remote attacker to escape sendbox.

The vulnerability exists due to an error in internal feed reader APIs implementation. A remote attacker can use escape the sendbox and leverage another remote code execution vulnerability to compromise vulnerable system.

Successful exploitation of the vulnerability may allow an attacker to escape sendbox and potentially compromise vulnerable system.

Mitigation

Update to Firefox 53 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 52.0 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Sendbox bypass

EUVDB-ID: #VU6335

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5456

CWE-ID: CWE-265 - Privilege / Sandbox Issues

Exploit availability: No

Description

The vulnerability allows a remote attacker to read files from local filesystem.

The vulnerability exists due to an error in sendbox implementation. A remote attacker can bypass file system access protections in the sandbox using the file system request constructor through an IPC message.

Successful exploitation of the vulnerability may allow an attacker to read arbitrary files from the vulnerable system.

Mitigation

Update to Firefox 53 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 52.0 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Information disclosure

EUVDB-ID: #VU6336

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5445

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to an error when parsing application/http-index-format format content where uninitialized values are used to create an array. A remote attacker can read portions of uninitialized memory.

Successful exploitation of the vulnerability may allow an attacker to gain access to potentially sensitive information.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Improper input validation

EUVDB-ID: #VU6337

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5449

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to trigger browser crash.

The vulnerability exists due to improper input validation during layout and manipulation of bidirectional unicode text in concert with CSS animations.. A remote attacker can perform a denial of service (DoS) attack.

Mitigation

Update to Firefox 53 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 52.0 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Address bar spoofing

EUVDB-ID: #VU6338

Risk: Low

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5450

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to spoof browser address bar.

The vulnerability exists due to an error when processing using a javascript: URI. A remote attacker can spoof the addressbar through the user interaction on the addressbar and the onblur event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar.

This vulnerability affects only Firefox for Android.

Mitigation

Update to Firefox 53.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Information disclosure

EUVDB-ID: #VU6339

Risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5462

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox has been updated with corresponding version of NSS.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Address bar spoofing

EUVDB-ID: #VU6340

Risk: Low

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5463

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to spoof browser address bar.

The vulnerability exists due to an error when processing reader view. Android intents can be used to launch Firefox for Android in reader mode with a user specified URL. This allows an attacker to spoof the contents of the addressbar as displayed to users.

This vulnerability affects only Firefox for Android.

Mitigation

Update to Firefox 53.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Memory corruption

EUVDB-ID: #VU6341

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5467

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to memory corruption when using Skia content when drawing content outside of the bounds of a clipping region. A remote attacker can trigger memory corruption and cause browser crash.

Mitigation

Update to Firefox 53 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 52.0 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Address bar spoofing

EUVDB-ID: #VU6342

Risk: Low

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5452

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to spoof browser address bar.

The vulnerability exists due to an error during scrolling with editable content. Malicious sites can display a spoofed addressbar on a page when the existing location bar on the new page is scrolled out of view if an HTML editable page element is user selected.

This vulnerability affects only Firefox for Android.

Mitigation

Update to Firefox 53.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) HTML injection

EUVDB-ID: #VU6343

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5453

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a spoofing attack.

The vulnerability exists due to an insufficient sanitization of data sent as URL parameters for a feed's TITLE element during scrolling with editable content. A remote attacker can inject aritrary HTML code and perform XSS attack.

Mitigation

Update to Firefox 53.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Self-XSS

EUVDB-ID: #VU6344

Risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5458

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a psoofing attack.

The vulnerability exists due to an insufficient sanitization of data sent as URL, when a javascript: URL is drag and dropped by a user into the addressbar, the URL will be processed and executed. A remote attacker can trick the victim into executing malicious JavaScript.

Mitigation

Update to Firefox 53.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Information disclosure

EUVDB-ID: #VU6345

Risk: Low

CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5468

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to an error connected with incorrect ownership model of privateBrowsing. An attacker can expose certain sensitive data through developer tools. This can result in a non-exploitable crash when manually triggered during debugging.

Mitigation

Update to Firefox 53.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Memory corruption

EUVDB-ID: #VU6346

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5430

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to memory corruption errors. A remote attacker can execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 52.0 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Memory corruption

EUVDB-ID: #VU6347

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5429

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to memory corruption errors. A remote attacker can execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Out-of-bounds read

EUVDB-ID: #VU6348

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5437,CVE-2016-10197

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error in search_make_new() function in evdns.c within libevent library before 2.1.6-beta. A remote attacker can trigger out-of-bounds read and gain access to sensitive system memory.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Firefox ESR: 45 - 52.0.2

Mozilla Firefox: 52 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Stack-based buffer overflow

EUVDB-ID: #VU6349

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5437,CVE-2016-10196

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error in evutil_parse_sockaddr_port() function in evutil.c within libevent library before 2.1.6-beta. A remote attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Firefox ESR: 45 - 52.0.2

Mozilla Firefox: 52 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Out-of-bounds read

EUVDB-ID: #VU6350

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5437,CVE-2016-10195

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error in name_parse() function in evdns.c within libevent library before 2.1.6-beta. A remote attacker can trigger out-of-bounds read and gain access to sensitive system memory.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Firefox ESR: 45 - 52.0.2

Mozilla Firefox: 52 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Heap-based buffer overflow

EUVDB-ID: #VU6351

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5469,CVE-2016-6354

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error in yy_get_next_buffer() function in Flex before 2.6.1. A remote attacker can trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Firefox ESR: 45 - 52.0.2

Mozilla Firefox: 52 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Use-after-free

EUVDB-ID: #VU6355

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5442

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error during changes in style when manipulating DOM elements. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

Firefox ESR: 45 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Address bar spoofing

EUVDB-ID: #VU6356

Risk: Low

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5451

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to spoof browser address bar.

The vulnerability exists due to an error when processing onblur event. A remote attacker can spoof the addressbar through the user interaction on the addressbar and the onblur event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar.

This vulnerability affects only Firefox for Android.

Mitigation

Update to Firefox 53.

Vulnerable software versions

Mozilla Firefox: 52 - 52.0.2

External links

http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###