[ASA-201910-16] firefox: multiple issues
Arch Linux Security Advisory ASA-201910-16 ========================================== Severity: Critical Date : 2019-10-26 CVE-ID : CVE-2018-6156 CVE-2019-11757 CVE-2019-11759 CVE-2019-11760 CVE-2019-11761 CVE-2019-11762 CVE-2019-11763 CVE-2019-11764 CVE-2019-11765 CVE-2019-15903 CVE-2019-17000 CVE-2019-17001 CVE-2019-17002 Package : firefox Type : multiple issues Remote : Yes Link : https://security.archlinux.org/AVG-1055 Summary ======= The package firefox before version 70.0-1 is vulnerable to multiple issues including arbitrary code execution, access restriction bypass, denial of service, insufficient validation and same-origin policy bypass. Resolution ========== Upgrade to 70.0-1. # pacman -Syu "firefox>=70.0-1" The problems have been fixed upstream in version 70.0. Workaround ========== None. Description =========== - CVE-2018-6156 (arbitrary code execution) A heap-based buffer overflow has been found in Firefox before 70.0, where an incorrect derivation of a packet length in WebRTC caused heap corruption via a crafted video file. - CVE-2019-11757 (arbitrary code execution) A use-after-free issue has been found in the IndexedDB component of Firefox before 70.0 and Thunderbird before 68.2. When storing a value in IndexedDB, the value's prototype chain is followed and it was possible to retain a reference to a locale, delete it, and subsequently reference it. - CVE-2019-11759 (arbitrary code execution) A stack-based buffer overflow has been found in the HKDF output of Firefox before 70.0 and Thunderbird before 68.2. An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. - CVE-2019-11760 (arbitrary code execution) A fixed-size stack buffer overflow has been found in nrappkit, in the WebRTC signaling code of Firefox before 70.0 and Thunderbird before 68.2. - CVE-2019-11761 (access restriction bypass) An issue has been found in Firefox before 70.0 and Thunderbird before 68.2, where by using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. - CVE-2019-11762 (same-origin policy bypass) A same-origin policy bypass has been found in Firefox before 70.0 and Thunderbird before 68.2 where, if two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross- origin window. - CVE-2019-11763 (insufficient validation) An issue has been found in Firefox before 70.0 and Thunderbird before 68.2, where failure to correctly handle null bytes when processing HTML entities resulted in incorrectly parsing these entities. This could have led to HTML comment text being treated as HTML which could have led to XSS in a web application under certain conditions. It could have also led to HTML entities being masked from filters, enabling the use of entities to mask the actual characters of interest from filters. - CVE-2019-11764 (arbitrary code execution) Several memory safety bugs have been found in Firefox before 70.0 and Thunderbird before 68.2. Some of these bugs showed evidence of memory corruption and Mozilla presumes that with enough effort some of these could be exploited to run arbitrary code. - CVE-2019-11765 (insufficient validation) Incorrect permissions could be granted to a website in Firefox before 70.0. A compromised content process could send a message to the parent process that would cause the 'Click to Play' permission prompt to be shown. However, due to lack of validation from the parent process, if the user accepted the permission request an attacker-controlled permission would be granted rather than the 'Click to Play' permission. - CVE-2019-15903 (denial of service) A security issue has been found in libexpat before 2.2.8, where crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read - CVE-2019-17000 (access restriction bypass) A CSP bypass has been found in Firefox 69, where an object tag with a data URI did not correctly inherit the document's Content Security Policy. This allowed a CSP bypass in a cross-origin frame if the document's policy explicitly allowed data: URIs. - CVE-2019-17001 (access restriction bypass) A CSP bypass has been found in Firefox 69, where a Content-Security- Policy that blocks in-line scripts could be bypassed using an object tag to execute JavaScript in the protected document (cross-site scripting). This is a separate bypass from CVE-2019-17000. - CVE-2019-17002 (access restriction bypass) An issue has been found in Firefox before 70.0 where, if upgrade- insecure-requests was specified in the Content Security Policy, and a link was dragged and dropped from that page, the link was not upgraded to https. Impact ====== A remote attacker can crash Firefox, bypass security measures or execute arbitrary code. References ========== https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2018-6156 https://bugzilla.mozilla.org/show_bug.cgi?id=1480088 https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-1175... https://www.mozilla.org/en-US/security/advisories/mfsa2019-35/#CVE-2019-1175... https://bugzilla.mozilla.org/show_bug.cgi?id=1577107 https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-1175... https://www.mozilla.org/en-US/security/advisories/mfsa2019-35/#CVE-2019-1175... https://bugzilla.mozilla.org/show_bug.cgi?id=1577953 https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-1176... https://www.mozilla.org/en-US/security/advisories/mfsa2019-35/#CVE-2019-1176... https://bugzilla.mozilla.org/show_bug.cgi?id=1577719 https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-1176... https://www.mozilla.org/en-US/security/advisories/mfsa2019-35/#CVE-2019-1176... https://bugzilla.mozilla.org/show_bug.cgi?id=1561502 https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-1176... https://www.mozilla.org/en-US/security/advisories/mfsa2019-35/#CVE-2019-1176... https://bugzilla.mozilla.org/show_bug.cgi?id=1582857 https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-1176... https://www.mozilla.org/en-US/security/advisories/mfsa2019-35/#CVE-2019-1176... https://bugzilla.mozilla.org/show_bug.cgi?id=1584216 https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-1176... https://www.mozilla.org/en-US/security/advisories/mfsa2019-35/#CVE-2019-1176... https://bugzilla.mozilla.org/buglist.cgi?bug_id=1558522%2C1577061%2C1548044%... https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-1176... https://bugzilla.mozilla.org/show_bug.cgi?id=1562582 https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desk... https://crbug.com/1004341 https://github.com/libexpat/libexpat/issues/317 https://github.com/libexpat/libexpat/pull/318 https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-1700... https://bugzilla.mozilla.org/show_bug.cgi?id=1441468 https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-1700... https://bugzilla.mozilla.org/show_bug.cgi?id=1587976 https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-1700... https://bugzilla.mozilla.org/show_bug.cgi?id=1561056 https://security.archlinux.org/CVE-2018-6156 https://security.archlinux.org/CVE-2019-11757 https://security.archlinux.org/CVE-2019-11759 https://security.archlinux.org/CVE-2019-11760 https://security.archlinux.org/CVE-2019-11761 https://security.archlinux.org/CVE-2019-11762 https://security.archlinux.org/CVE-2019-11763 https://security.archlinux.org/CVE-2019-11764 https://security.archlinux.org/CVE-2019-11765 https://security.archlinux.org/CVE-2019-15903 https://security.archlinux.org/CVE-2019-17000 https://security.archlinux.org/CVE-2019-17001 https://security.archlinux.org/CVE-2019-17002
participants (1)
-
Remi Gacogne