USN-2185-1: Firefox vulnerabilities
29 April 2014
Firefox could be made to crash or run programs as your login if it opened a malicious website.
Releases
Packages
- firefox - Mozilla Open Source web browser
Details
Bobby Holley, Carsten Book, Christoph Diehl, Gary Kwong, Jan de Mooij,
Jesse Ruderman, Nathan Froyd, John Schoenick, Karl Tomlinson, Vladimir
Vukicevic and Christian Holler discovered multiple memory safety issues in
Firefox. If a user were tricked in to opening a specially crafted website,
an attacker could potentially exploit these to cause a denial of service
via application crash, or execute arbitrary code with the privileges of
the user invoking Firefox. (CVE-2014-1518, CVE-2014-1519)
An out of bounds read was discovered in Web Audio. An attacker could
potentially exploit this cause a denial of service via application crash
or execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2014-1522)
Abhishek Arya discovered an out of bounds read when decoding JPG images.
An attacker could potentially exploit this to cause a denial of service
via application crash. (CVE-2014-1523)
Abhishek Arya discovered a buffer overflow when a script uses a non-XBL
object as an XBL object. An attacker could potentially exploit this to
execute arbitrary code with the privileges of the user invoking Firefox.
(CVE-2014-1524)
Abhishek Arya discovered a use-after-free in the Text Track Manager when
processing HTML video. An attacker could potentially exploit this to cause
a denial of service via application crash or execute arbitrary code with
the privileges of the user invoking Firefox. (CVE-2014-1525)
Jukka Jylänki discovered an out-of-bounds write in Cairo when working
with canvas in some circumstances. An attacker could potentially exploit
this to cause a denial of service via application crash or execute
arbitrary code with the privileges of the user invoking Firefox.
(CVE-2014-1528)
Mariusz Mlynski discovered that sites with notification permissions can
run script in a privileged context in some circumstances. An attacker
could exploit this to execute arbitrary code with the privileges of the
user invoking Firefox. (CVE-2014-1529)
It was discovered that browser history navigations could be used to load
a site with the addressbar displaying the wrong address. An attacker could
potentially exploit this to conduct cross-site scripting or phishing
attacks. (CVE-2014-1530)
A use-after-free was discovered when resizing images in some
circumstances. An attacker could potentially exploit this to cause a
denial of service via application crash or execute arbitrary code with the
privileges of the user invoking Firefox. (CVE-2014-1531)
Christian Heimes discovered that NSS did not handle IDNA domain prefixes
correctly for wildcard certificates. An attacker could potentially exploit
this by using a specially crafted certificate to conduct a machine-in-the-middle
attack. (CVE-2014-1492)
Tyson Smith and Jesse Schwartzentruber discovered a use-after-free during
host resolution in some circumstances. An attacker could potentially
exploit this to cause a denial of service via application crash or execute
arbitrary code with the privileges of the user invoking Firefox.
(CVE-2014-1532)
Boris Zbarsky discovered that the debugger bypassed XrayWrappers for some
objects. If a user were tricked in to opening a specially crafted website
whilst using the debugger, an attacker could potentially exploit this to
execute arbitrary code with the privileges of the user invoking Firefox.
(CVE-2014-1526)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
Ubuntu 13.10
Ubuntu 12.10
Ubuntu 12.04
After a standard system update you need to restart Firefox to make
all the necessary changes.
Related notices
- USN-2189-1: thunderbird-locale-ca, thunderbird-locale-nb, thunderbird-locale-it, thunderbird-locale-da, thunderbird-locale-en, thunderbird-locale-fr, thunderbird-locale-en-gb, thunderbird-locale-be, thunderbird-locale-pt, thunderbird-locale-ast, thunderbird-locale-ar, thunderbird-locale-ga, thunderbird-locale-ka, thunderbird-locale-fi, thunderbird-globalmenu, thunderbird-locale-en-us, thunderbird-locale-zh-tw, xul-ext-lightning, thunderbird-locale-nl, thunderbird-locale-ja, thunderbird-mozsymbols, thunderbird-locale-gl, thunderbird-locale-fy-nl, thunderbird-locale-tr, thunderbird-locale-zh-cn, thunderbird-locale-si, thunderbird-locale-hy, thunderbird, thunderbird-locale-sk, thunderbird-locale-af, thunderbird-locale-bn, thunderbird-locale-sr, thunderbird-locale-bn-bd, thunderbird-locale-es, thunderbird-locale-pt-pt, thunderbird-locale-sl, xul-ext-gdata-provider, thunderbird-locale-br, thunderbird-locale-cs, thunderbird-locale-rm, thunderbird-locale-eu, thunderbird-locale-he, thunderbird-locale-ga-ie, thunderbird-locale-ro, thunderbird-locale-el, thunderbird-locale-bg, thunderbird-locale-de, thunderbird-locale-sv, thunderbird-locale-hu, thunderbird-locale-et, thunderbird-gnome-support, thunderbird-locale-zh-hans, thunderbird-locale-is, thunderbird-locale-sv-se, thunderbird-testsuite, thunderbird-locale-pa, thunderbird-locale-id, xul-ext-calendar-timezones, thunderbird-locale-es-ar, thunderbird-locale-es-es, thunderbird-locale-sq, thunderbird-locale-uk, thunderbird-locale-hr, thunderbird-locale-vi, thunderbird-locale-zh-hant, thunderbird-locale-mk, thunderbird-locale-nb-no, thunderbird-locale-pl, thunderbird-locale-fy, thunderbird-locale-ko, thunderbird-locale-ru, thunderbird-locale-pa-in, thunderbird-locale-ta, thunderbird-dev, thunderbird-locale-ta-lk, thunderbird-locale-nn, thunderbird-locale-lt, thunderbird-locale-nn-no, thunderbird-locale-gd, thunderbird-locale-pt-br
- USN-2159-1: nss, libnss3-1d, libnss3