Multiple vulnerabilities in Mozilla Firefox

Published: 2017-08-08 00:00:00 | Updated: 2017-08-15 13:49:47
Severity High
Patch available YES
Number of vulnerabilities 29
CVSSv2 5.3 (AV:N/AC:M/Au:N/C:C/I:N/A:N/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
3 (AV:N/AC:H/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
5.3 (AV:N/AC:M/Au:N/C:N/I:C/A:N/E:U/RL:OF/RC:C)
3.2 (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.3 (AV:N/AC:M/Au:N/C:C/I:N/A:N/E:U/RL:OF/RC:C)
5.3 (AV:N/AC:M/Au:N/C:N/I:C/A:N/E:U/RL:OF/RC:C)
5.3 (AV:N/AC:M/Au:N/C:N/I:C/A:N/E:U/RL:OF/RC:C)
1.6 (AV:L/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
5 (AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.3 (AV:N/AC:M/Au:N/C:N/I:C/A:N/E:U/RL:OF/RC:C)
3.6 (AV:L/AC:L/Au:N/C:N/I:C/A:N/E:U/RL:OF/RC:C)
5.3 (AV:N/AC:M/Au:N/C:N/I:C/A:N/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
1.9 (AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.3 (AV:N/AC:M/Au:N/C:N/I:C/A:N/E:U/RL:OF/RC:C)
5.3 (AV:N/AC:M/Au:N/C:N/I:C/A:N/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.3 (AV:N/AC:M/Au:N/C:N/I:C/A:N/E:U/RL:OF/RC:C)
5.3 (AV:N/AC:M/Au:N/C:C/I:N/A:N/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
CVSSv3 6.4 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
5.9 [CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
5.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
5.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
5.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
5.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
4.7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
5.4 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
5.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
4.7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
5.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
4.1 [CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
5.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
5.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
5.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
5.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE ID CVE-2017-7753
CVE-2017-7779
CVE-2017-7780
CVE-2017-7781
CVE-2017-7782
CVE-2017-7783
CVE-2017-7784
CVE-2017-7785
CVE-2017-7786
CVE-2017-7787
CVE-2017-7788
CVE-2017-7789
CVE-2017-7790
CVE-2017-7791
CVE-2017-7792
CVE-2017-7794
CVE-2017-7796
CVE-2017-7797
CVE-2017-7798
CVE-2017-7799
CVE-2017-7800
CVE-2017-7801
CVE-2017-7802
CVE-2017-7803
CVE-2017-7804
CVE-2017-7806
CVE-2017-7807
CVE-2017-7808
CVE-2017-7809
CWE ID CWE-125
CWE-119
CWE-20
CWE-416
CWE-120
CWE-200
CWE-264
CWE-79
Exploitation vector Network
Public exploit Not available
Vulnerable software Mozilla Firefox
Vulnerable software versions Mozilla Firefox 53.0.3
Mozilla Firefox 54.0
Mozilla Firefox 53.0.2
Show more
Vendor URL Mozilla
Advisory type Public

Security Advisory

1) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to out-of-bounds read when applying style rules to pseudo-elements, such as ::first-line, using cached style data. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and read arbitrary files on the system.

Successful exploitation of the vulnerability results in information disclosure.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

2) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 55.0 or ESR 52.3.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

3) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

4) Man-in-the-middle attack

Description

The vulnerability allows a remote attacker to conduct man-in-the-middle attack.

The weakness exists due to an elliptic curve point addition error when using mixed Jacobian-affine coordinates. A remote attacker can trick the victim into visiting a specially crafted website and use man-in-the-middle techniques to interfere with a connection and compute an incorrect shared secret.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

5) Security restrictions bypass

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to an error in the WindowsDllDetourPatcher function. A remote attacker can trick the victim into visiting a specially crafted website and allocate memory without DEP protections.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

6) Denial of service

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to improper input validation. A remote attacker can trick the victim into visiting a specially crafted website containing a specially crafted username and password combination, trigger modal prompt and cause the browser to crash.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

7) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error when reading an image observer during frame reconstruction after the observer has been freed. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

8) Buffer overflow

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to buffer overflow when manipulating Accessible Rich Internet Applications (ARIA) attributes within the DOM. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

9) Buffer overflow

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to buffer overflow when the image renderer attempts to paint non-displayable SVG elements. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

10) Information disclosure

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to improper access controls. A remote attacker can trick the victim into visiting a specially crafted website, bypass same-origin policy protections on pages with embedded iframes during page reloads and access content on the top level page.

Successful exploitation of the vulnerability results in information disclosure.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

11) Security restrictions bypass

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to insufficient same-origin policies. A remote attacker can trick the victim into visiting a specially crafted website, use a compromised content process and bypass Content Security Policy (CSP) for sandboxed 'about:srcdoc' iframes.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

12) Security restrictions bypass

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to insufficient same-origin policies. A remote attacker can trick the victim into visiting a specially crafted website, trigger the server to send two Strict-Transport-Security (STS) headers for a single connection and cause HTTP Strict Transport Security (HSTS) to fail to be enabled for the connection.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

13) Denial of service

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to improper input validation. A local attacker can copy stack memory data into the crash reporter and cause the browser to crash.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

14) Spoofing attack

Description

The vulnerability allows a remote attacker to conduct spoofing attack on the target system.

The weakness exists due to improper input validation. A remote attacker can trick the victim into visiting a specially crafted website and use iframe content and the 'data:' protocol to spoof the origin of a modal alert.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

15) Buffer overflow

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to buffer overflow when viewing a certificate in the certificate manager if the certificate has an extremely long object identifier (OID). A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

16) Security restrictions bypass

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to improper input validation. A remote attacker can trick the victim into visiting a specially crafted website, use a compromised content process and cause the sandbox broker to truncate files on Linux-based systems.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

17) Security restrictions bypass

Description

The vulnerability allows a local attacker to bypass security restrictions on the target system.

The weakness exists due to an error in Windows updater. A local attacker can cause the Windows updater to delete files named 'update.log'.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

18) Security restrictions bypass

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to improper input validation. A remote attacker can trick the victim into visiting a specially crafted website and bypass same-origin restrictions in processing stored header names.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

19) Improper input validation

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to improper sanitization of the web page source code. A remote attacker can trick the victim into visiting a specially crafted website with the style editor tool, trigger a XUL injection flaw in the Developer Tools feature and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

20) Self-XSS

Description

The vulnerability allows a remote attacker to conduct self-XSS attack.

The weakness exists due to JavaScript in the about:webrtc page is not sanitized properly being assigned to innerHTML. A remote attacker can inject and execute malicious script in a victim's Web browser within the security context of the hosting Web site to steal the victim's cookie-based authentication credentials.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

21) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error in WebSockets when the object holding the connection is freed before the disconnection operation is finished. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

22) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error when recomputing layout for a marquee element during window resizing. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

23) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error when manipulating the DOM during the resize event of an image element. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

24) Security restrictions bypass

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to content security policy (CSP) directives being ignored. A remote attacker can trick the victim into visiting a specially crafted website and cause the incorrect enforcement of CSP.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

25) Security restrictions bypass

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to improper input validation. A remote attacker can trick the victim into visiting a specially crafted website,cause the WindowsDllDetourPatcher class to bypass memory protections and write arbitrary data to arbitrary memory locations.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

26) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error when the layer manager is freed too early when rendering specific SVG content. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

27) Domain hijacking

Description

The vulnerability allows a remote attacker to hijack the domain on the target system.

The weakness exists due to improper access controls. A remote attacker can trick the victim into visiting a specially crafted website, invoke AppCache and hijack a URL in a domain.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

28) Information disclosure

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to cross-origin information leak. A remote attacker can trick the victim into visiting a specially crafted website, use a content security policy (CSP) frame-ancestors directive to gain access to arbitrary files.

Successful exploitation of the vulnerability results in information disclosure.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

29) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error when an editor DOM node is deleted prematurely during tree traversal while still bound to the document. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 55.0.

External links

https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/

Back to List