[arch-security] [ASA-201703-15] firefox: arbitrary code execution

Remi Gacogne rgacogne at archlinux.org
Mon Mar 20 08:47:46 UTC 2017


Arch Linux Security Advisory ASA-201703-15
==========================================

Severity: High
Date    : 2017-03-18
CVE-ID  : CVE-2017-5428
Package : firefox
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-219

Summary
=======

The package firefox before version 52.0.1-1 is vulnerable to arbitrary
code execution.

Resolution
==========

Upgrade to 52.0.1-1.

# pacman -Syu "firefox>=52.0.1-1"

The problem has been fixed upstream in version 52.0.1.

Workaround
==========

None.

Description
===========

An integer overflow in createImageBitmap() was reported through the
Pwn2Own contest. The fix for this vulnerability disables the
experimental extensions to the createImageBitmap API. This function
runs in the content sandbox, requiring a second vulnerability to
compromise a user's computer.

Impact
======

A remote attacker might be able to execute arbitrary code on the
affected host.

References
==========

https://www.mozilla.org/en-US/security/advisories/mfsa2017-08/#CVE-2017-5428
https://bugzilla.mozilla.org/show_bug.cgi?id=1348168
https://security.archlinux.org/CVE-2017-5428

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170320/89fd3602/attachment.asc>


More information about the arch-security mailing list