[arch-security] [ASA-201711-23] firefox: multiple issues
rgacogne at archlinux.org
Thu Nov 16 12:52:57 UTC 2017
Arch Linux Security Advisory ASA-201711-23
Date : 2017-11-15
CVE-ID : CVE-2017-7826 CVE-2017-7827 CVE-2017-7828 CVE-2017-7830
CVE-2017-7831 CVE-2017-7832 CVE-2017-7833 CVE-2017-7834
CVE-2017-7835 CVE-2017-7836 CVE-2017-7837 CVE-2017-7838
CVE-2017-7839 CVE-2017-7840 CVE-2017-7842
Package : firefox
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-494
The package firefox before version 57.0-1 is vulnerable to multiple
issues including arbitrary code execution, same-origin policy bypass,
access restriction bypass, content spoofing, information disclosure,
privilege escalation and cross-site scripting.
Upgrade to 57.0-1.
# pacman -Syu "firefox>=57.0-1"
The problems have been fixed upstream in version 57.0.
- CVE-2017-7826 (arbitrary code execution)
Several reported memory safety bugs have been found in Firefox before
57.0. Some of these bugs showed evidence of memory corruption and with
enough effort some of these could probably be exploited to run
- CVE-2017-7827 (arbitrary code execution)
Several memory safety bugs have been found in Firefox before 57.0. Some
of these bugs showed evidence of memory corruption and with enough
effort some of these could probably be exploited to run arbitrary code.
- CVE-2017-7828 (arbitrary code execution)
A use-after-free vulnerability can occur in Firefox before 57.0 when
flushing and resizing layout because the PressShell object has been
freed while still in use. This results in a potentially exploitable
crash during these operations.
- CVE-2017-7830 (same-origin policy bypass)
The Resource Timing API in Firefox before 57.0 incorrectly revealed
navigations in cross-origin iframes. This is a same-origin policy
violation and could allow for data theft of URLs loaded by users.
- CVE-2017-7831 (information disclosure)
A vulnerability has been found in Firefox before 57.0 where the
security wrapper does not deny access to some exposed properties using
the deprecated exposedProps mechanism on proxy objects. These
properties should be explicitly unavailable to proxy objects.
- CVE-2017-7832 (content spoofing)
The combined, single character, version of the letter 'i' with any of
the potential accents in unicode, such as acute or grave, can be
spoofed in the addressbar of Firefox before 57.0 by the dotless version
of 'i' followed by the same accent as a second character with most font
sets. This allows for domain spoofing attacks because these combined
domain names do not display as punycode.
- CVE-2017-7833 (content spoofing)
Some Arabic and Indic vowel marker characters can be combined with
Latin characters in a domain name to eclipse the non-Latin character
with some font sets on the addressbar of Firefox before 57.0. The non-
Latin character will not be visible to most viewers. This allows for
domain spoofing attacks because these combined domain names do not
display as punycode.
- CVE-2017-7834 (access restriction bypass)
A data: URL loaded in a new tab of Firefox before 57.0 did not inherit
the Content Security Policy (CSP) of the original page, allowing for
versions when data: documents also inherited the context of the
original page this would allow for potential cross-site scripting (XSS)
- CVE-2017-7835 (access restriction bypass)
Mixed content blocking of insecure (HTTP) sub-resources in a secure
(HTTPS) document was not correctly applied for resources that redirect
from HTTPS to HTTP, allowing content that should be blocked, such as
scripts, to be loaded on a page in Firefox before 57.0.
- CVE-2017-7836 (privilege escalation)
The "pingsender" executable used by the Firefox Health Report before
57.0 dynamically loads a system copy of libcurl, which an attacker
could replace. This allows for privilege escalation as the replaced
libcurl code will run with Firefox's privileges. This attack requires
an attacker have local system access.
- CVE-2017-7837 (same-origin policy bypass)
SVG loaded through <img> tags in Firefox before 57.0 can use <meta>
tags within the SVG data to set cookies for that page.
- CVE-2017-7838 (content spoofing)
Punycode format text in Firefox before 57.0 will be displayed for
entire qualified international domain names in some instances when a
sub-domain triggers the punycode display instead of the primary domain
being displayed in native script and the sub-domain only displaying as
punycode. This could be used for limited spoofing attacks due to user
- CVE-2017-7839 (cross-site scripting)
addressbar in Firefox before 57.0 can cause the leading characters to
blocked. This could be used in social engineering and self-cross-site-
scripting (self-XSS) attacks where users are convinced to copy and
paste text into the addressbar.
- CVE-2017-7840 (cross-site scripting)
before 57.0. If the resulting exported HTML file is later opened in a
engineering and self-cross-site-scripting (self-XSS) attacks if users
were convinced to add malicious tags to bookmarks, export them, and
then open the resulting file.
- CVE-2017-7842 (information disclosure)
If a document’s Referrer Policy attribute is set to "no-referrer"
sometimes two network requests are made for <link> elements instead of
one in Firefox before 57.0. One of these requests includes the referrer
instead of respecting the set policy to not include a referrer on
A remote attacker can bypass the same-origin policy or the content
security policy, spoof the content of the addressbar, trick a user into
a self-XSS attack, access sensitive information or execute arbitrary
code on the affected host. A local attacker might be able to escalate
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: OpenPGP digital signature
More information about the arch-security