Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU51661
Risk: Medium
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-23981
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition during texture upload of a Pixel Buffer Object in WebGL. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Manager Proxy: 4.0
SUSE Manager Retail Branch Server: 4.0
SUSE Manager Server: 4.0
SUSE Linux Enterprise Server for SAP: 15 - 15-SP1
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP1-LTSS
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE MicroOS: 5.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
SUSE Linux Enterprise Module for Basesystem: 15-SP2
mozilla-nspr-32bit-debuginfo: before 4.25.1-3.17.1
mozilla-nspr-32bit: before 4.25.1-3.17.1
mozilla-nspr-devel: before 4.25.1-3.17.1
MozillaFirefox-translations-other: before 78.9.0-3.136.1
MozillaFirefox-translations-common: before 78.9.0-3.136.1
MozillaFirefox-devel: before 78.9.0-3.136.1
MozillaFirefox-debugsource: before 78.9.0-3.136.1
MozillaFirefox-debuginfo: before 78.9.0-3.136.1
MozillaFirefox-branding-SLE: before 78-4.16.1
MozillaFirefox: before 78.9.0-3.136.1
mozilla-nspr-debugsource: before 4.25.1-3.17.1
mozilla-nspr-debuginfo: before 4.25.1-3.17.1
mozilla-nspr: before 4.25.1-3.17.1
External linkshttp://www.suse.com/support/update/announcement/2021/suse-su-20211007-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51662
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-23982
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the way Firefox handles requests to internal hosts. Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Manager Proxy: 4.0
SUSE Manager Retail Branch Server: 4.0
SUSE Manager Server: 4.0
SUSE Linux Enterprise Server for SAP: 15 - 15-SP1
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP1-LTSS
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE MicroOS: 5.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
SUSE Linux Enterprise Module for Basesystem: 15-SP2
mozilla-nspr-32bit-debuginfo: before 4.25.1-3.17.1
mozilla-nspr-32bit: before 4.25.1-3.17.1
mozilla-nspr-devel: before 4.25.1-3.17.1
MozillaFirefox-translations-other: before 78.9.0-3.136.1
MozillaFirefox-translations-common: before 78.9.0-3.136.1
MozillaFirefox-devel: before 78.9.0-3.136.1
MozillaFirefox-debugsource: before 78.9.0-3.136.1
MozillaFirefox-debuginfo: before 78.9.0-3.136.1
MozillaFirefox-branding-SLE: before 78-4.16.1
MozillaFirefox: before 78.9.0-3.136.1
mozilla-nspr-debugsource: before 4.25.1-3.17.1
mozilla-nspr-debuginfo: before 4.25.1-3.17.1
mozilla-nspr: before 4.25.1-3.17.1
External linkshttp://www.suse.com/support/update/announcement/2021/suse-su-20211007-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51664
Risk: Medium
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-23984
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data. A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing credentials.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Manager Proxy: 4.0
SUSE Manager Retail Branch Server: 4.0
SUSE Manager Server: 4.0
SUSE Linux Enterprise Server for SAP: 15 - 15-SP1
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP1-LTSS
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE MicroOS: 5.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
SUSE Linux Enterprise Module for Basesystem: 15-SP2
mozilla-nspr-32bit-debuginfo: before 4.25.1-3.17.1
mozilla-nspr-32bit: before 4.25.1-3.17.1
mozilla-nspr-devel: before 4.25.1-3.17.1
MozillaFirefox-translations-other: before 78.9.0-3.136.1
MozillaFirefox-translations-common: before 78.9.0-3.136.1
MozillaFirefox-devel: before 78.9.0-3.136.1
MozillaFirefox-debugsource: before 78.9.0-3.136.1
MozillaFirefox-debuginfo: before 78.9.0-3.136.1
MozillaFirefox-branding-SLE: before 78-4.16.1
MozillaFirefox: before 78.9.0-3.136.1
mozilla-nspr-debugsource: before 4.25.1-3.17.1
mozilla-nspr-debuginfo: before 4.25.1-3.17.1
mozilla-nspr: before 4.25.1-3.17.1
External linkshttp://www.suse.com/support/update/announcement/2021/suse-su-20211007-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51667
Risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-23987
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Manager Proxy: 4.0
SUSE Manager Retail Branch Server: 4.0
SUSE Manager Server: 4.0
SUSE Linux Enterprise Server for SAP: 15 - 15-SP1
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP1-LTSS
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE MicroOS: 5.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
SUSE Linux Enterprise Module for Basesystem: 15-SP2
mozilla-nspr-32bit-debuginfo: before 4.25.1-3.17.1
mozilla-nspr-32bit: before 4.25.1-3.17.1
mozilla-nspr-devel: before 4.25.1-3.17.1
MozillaFirefox-translations-other: before 78.9.0-3.136.1
MozillaFirefox-translations-common: before 78.9.0-3.136.1
MozillaFirefox-devel: before 78.9.0-3.136.1
MozillaFirefox-debugsource: before 78.9.0-3.136.1
MozillaFirefox-debuginfo: before 78.9.0-3.136.1
MozillaFirefox-branding-SLE: before 78-4.16.1
MozillaFirefox: before 78.9.0-3.136.1
mozilla-nspr-debugsource: before 4.25.1-3.17.1
mozilla-nspr-debuginfo: before 4.25.1-3.17.1
mozilla-nspr: before 4.25.1-3.17.1
External linkshttp://www.suse.com/support/update/announcement/2021/suse-su-20211007-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.