SB2020072979 - Ubuntu update for firefox



SB2020072979 - Ubuntu update for firefox

Published: July 29, 2020 Updated: April 23, 2025

Security Bulletin ID SB2020072979
Severity
High
Patch available
YES
Number of vulnerabilities 9
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 22% Medium 44% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 9 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2020-6463)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error in ANGLE in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger a heap-based buffer overflow and execute arbitrary code on the system.


2) Information disclosure (CVE-ID: CVE-2020-15652)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in stack trace for JavaScript errors. A remote attacker can obtain result of a cross-origin redirect.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-15653)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to application does not properly impose security restrictions, when allowing popups. A remote attacker can create a specially crafted web page with noopener links that may allow an attacker to bypass iframe sandbox for websites relying on sandbox configurations, if allow-popups flag is set.


4) Resource management error (CVE-ID: CVE-2020-15654)

The vulnerability allows a remote attacker to bypass certain security restrictions.

When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work.


5) Type Confusion (CVE-ID: CVE-2020-15656)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a type confusion error when JIT optimizations involving the Javascript arguments object could confuse later optimizations in IonMonkey. A remote attacker can pass specially crafted data to the application, trigger a type confusion error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Input validation error (CVE-ID: CVE-2020-15658)

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to insufficient validation of special characters during file download, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. A remote attacker can override file type when saving data to disk.


7) Buffer overflow (CVE-ID: CVE-2020-15659)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


8) Information disclosure (CVE-ID: CVE-2020-15655)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists in the Extension APIs. A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information.


9) Improperly implemented security check for standard (CVE-ID: CVE-2020-6514)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to WebRTC used the memory address of a class instance as a connection identifier. A remote attacker can use the obtained value to bypass ASLR protection.

Remediation

Install update from vendor's website.