SB20250502307 - SUSE update for MozillaFirefox 



SB20250502307 - SUSE update for MozillaFirefox

Published: May 2, 2025

Security Bulletin ID SB20250502307
Severity
High
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 71% Medium 14% Low 14%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Improper locking (CVE-ID: CVE-2025-2817)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper locking mechanism in Firefox Updater. A medium-integrity user process can  interfere with the SYSTEM-level updater by manipulating the file-locking behavior by injecting code into the user-privileged process. A local user or malicious software installed on the system can bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation.


2) Buffer overflow (CVE-ID: CVE-2025-4082)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing WebGL shader attributes. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.

Note, the vulnerability affects macOS installations only.


3) Protection Mechanism Failure (CVE-ID: CVE-2025-4083)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient process isolation when handling "javascript:" URI links. An attacker can trick the victim into clicking on a specially crafted link and execute content in the top-level document's process instead of the intended frame.


4) Input validation error (CVE-ID: CVE-2025-4084)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient insufficient escaping of the ampersand character in the "copy as cURL" feature. A remote attacker can trick the victim into copying a specially crafted URL and execute arbitrary commands on the system.

Note, the vulnerability affects Windows installations only.


5) Out-of-bounds read (CVE-ID: CVE-2025-4087)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary condition when parsing XPath content. A remote attacker can trick the victim into visiting a specially crafted website, trigger an out-of-bounds read error and execute arbitrary code on the system.


6) Buffer overflow (CVE-ID: CVE-2025-4091)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Buffer overflow (CVE-ID: CVE-2025-4093)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.