[arch-security] [ASA-201711-23] firefox: multiple issues
Remi Gacogne
rgacogne at archlinux.org
Thu Nov 16 12:52:57 UTC 2017
Arch Linux Security Advisory ASA-201711-23
==========================================
Severity: Critical
Date : 2017-11-15
CVE-ID : CVE-2017-7826 CVE-2017-7827 CVE-2017-7828 CVE-2017-7830
CVE-2017-7831 CVE-2017-7832 CVE-2017-7833 CVE-2017-7834
CVE-2017-7835 CVE-2017-7836 CVE-2017-7837 CVE-2017-7838
CVE-2017-7839 CVE-2017-7840 CVE-2017-7842
Package : firefox
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-494
Summary
=======
The package firefox before version 57.0-1 is vulnerable to multiple
issues including arbitrary code execution, same-origin policy bypass,
access restriction bypass, content spoofing, information disclosure,
privilege escalation and cross-site scripting.
Resolution
==========
Upgrade to 57.0-1.
# pacman -Syu "firefox>=57.0-1"
The problems have been fixed upstream in version 57.0.
Workaround
==========
None.
Description
===========
- CVE-2017-7826 (arbitrary code execution)
Several reported memory safety bugs have been found in Firefox before
57.0. Some of these bugs showed evidence of memory corruption and with
enough effort some of these could probably be exploited to run
arbitrary code.
- CVE-2017-7827 (arbitrary code execution)
Several memory safety bugs have been found in Firefox before 57.0. Some
of these bugs showed evidence of memory corruption and with enough
effort some of these could probably be exploited to run arbitrary code.
- CVE-2017-7828 (arbitrary code execution)
A use-after-free vulnerability can occur in Firefox before 57.0 when
flushing and resizing layout because the PressShell object has been
freed while still in use. This results in a potentially exploitable
crash during these operations.
- CVE-2017-7830 (same-origin policy bypass)
The Resource Timing API in Firefox before 57.0 incorrectly revealed
navigations in cross-origin iframes. This is a same-origin policy
violation and could allow for data theft of URLs loaded by users.
- CVE-2017-7831 (information disclosure)
A vulnerability has been found in Firefox before 57.0 where the
security wrapper does not deny access to some exposed properties using
the deprecated exposedProps mechanism on proxy objects. These
properties should be explicitly unavailable to proxy objects.
- CVE-2017-7832 (content spoofing)
The combined, single character, version of the letter 'i' with any of
the potential accents in unicode, such as acute or grave, can be
spoofed in the addressbar of Firefox before 57.0 by the dotless version
of 'i' followed by the same accent as a second character with most font
sets. This allows for domain spoofing attacks because these combined
domain names do not display as punycode.
- CVE-2017-7833 (content spoofing)
Some Arabic and Indic vowel marker characters can be combined with
Latin characters in a domain name to eclipse the non-Latin character
with some font sets on the addressbar of Firefox before 57.0. The non-
Latin character will not be visible to most viewers. This allows for
domain spoofing attacks because these combined domain names do not
display as punycode.
- CVE-2017-7834 (access restriction bypass)
A data: URL loaded in a new tab of Firefox before 57.0 did not inherit
the Content Security Policy (CSP) of the original page, allowing for
bypasses of the policy including the execution of JavaScript. In prior
versions when data: documents also inherited the context of the
original page this would allow for potential cross-site scripting (XSS)
attacks.
- CVE-2017-7835 (access restriction bypass)
Mixed content blocking of insecure (HTTP) sub-resources in a secure
(HTTPS) document was not correctly applied for resources that redirect
from HTTPS to HTTP, allowing content that should be blocked, such as
scripts, to be loaded on a page in Firefox before 57.0.
- CVE-2017-7836 (privilege escalation)
The "pingsender" executable used by the Firefox Health Report before
57.0 dynamically loads a system copy of libcurl, which an attacker
could replace. This allows for privilege escalation as the replaced
libcurl code will run with Firefox's privileges. This attack requires
an attacker have local system access.
- CVE-2017-7837 (same-origin policy bypass)
SVG loaded through <img> tags in Firefox before 57.0 can use <meta>
tags within the SVG data to set cookies for that page.
- CVE-2017-7838 (content spoofing)
Punycode format text in Firefox before 57.0 will be displayed for
entire qualified international domain names in some instances when a
sub-domain triggers the punycode display instead of the primary domain
being displayed in native script and the sub-domain only displaying as
punycode. This could be used for limited spoofing attacks due to user
confusion.
- CVE-2017-7839 (cross-site scripting)
Control characters prepended before javascript: URLs pasted in the
addressbar in Firefox before 57.0 can cause the leading characters to
be ignored and the pasted JavaScript to be executed instead of being
blocked. This could be used in social engineering and self-cross-site-
scripting (self-XSS) attacks where users are convinced to copy and
paste text into the addressbar.
- CVE-2017-7840 (cross-site scripting)
JavaScript can be injected into an exported bookmarks file by placing
JavaScript code into user-supplied tags in saved bookmarks in Firefox
before 57.0. If the resulting exported HTML file is later opened in a
browser this JavaScript will be executed. This could be used in social
engineering and self-cross-site-scripting (self-XSS) attacks if users
were convinced to add malicious tags to bookmarks, export them, and
then open the resulting file.
- CVE-2017-7842 (information disclosure)
If a document’s Referrer Policy attribute is set to "no-referrer"
sometimes two network requests are made for <link> elements instead of
one in Firefox before 57.0. One of these requests includes the referrer
instead of respecting the set policy to not include a referrer on
requests.
Impact
======
A remote attacker can bypass the same-origin policy or the content
security policy, spoof the content of the addressbar, trick a user into
a self-XSS attack, access sensitive information or execute arbitrary
code on the affected host. A local attacker might be able to escalate
privilege.
References
==========
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7826
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1394530%2C1369561%2C1411458%2C1400003%2C1395138%2C1408412%2C1393840%2C1400763%2C1339259%2C1394265%2C1407740%2C1407751%2C1408005%2C1406398%2C1387799%2C1261175%2C1400554%2C1375146%2C1397811%2C1404636%2C1401804
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7827
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1399922%2C1403646%2C1403716%2C1365894%2C1402876%2C1406154%2C1384121%2C1384615%2C1407375%2C1339485%2C1361432%2C1394031%2C1383019%2C1407032%2C1387845%2C1386490
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7828
https://bugzilla.mozilla.org/show_bug.cgi?id=1406750
https://bugzilla.mozilla.org/show_bug.cgi?id=1412252
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7830
https://bugzilla.mozilla.org/show_bug.cgi?id=1408990
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7831
https://bugzilla.mozilla.org/show_bug.cgi?id=1392026
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7832
https://bugzilla.mozilla.org/show_bug.cgi?id=1408782
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7833
https://bugzilla.mozilla.org/show_bug.cgi?id=1370497
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7834
https://bugzilla.mozilla.org/show_bug.cgi?id=1358009
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7835
https://bugzilla.mozilla.org/show_bug.cgi?id=1402363
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7836
https://bugzilla.mozilla.org/show_bug.cgi?id=1401339
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7837
https://bugzilla.mozilla.org/show_bug.cgi?id=1325923
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7838
https://bugzilla.mozilla.org/show_bug.cgi?id=1399540
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7839
https://bugzilla.mozilla.org/show_bug.cgi?id=1402896
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7840
https://bugzilla.mozilla.org/show_bug.cgi?id=1366420
https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7842
https://bugzilla.mozilla.org/show_bug.cgi?id=1397064
https://security.archlinux.org/CVE-2017-7826
https://security.archlinux.org/CVE-2017-7827
https://security.archlinux.org/CVE-2017-7828
https://security.archlinux.org/CVE-2017-7830
https://security.archlinux.org/CVE-2017-7831
https://security.archlinux.org/CVE-2017-7832
https://security.archlinux.org/CVE-2017-7833
https://security.archlinux.org/CVE-2017-7834
https://security.archlinux.org/CVE-2017-7835
https://security.archlinux.org/CVE-2017-7836
https://security.archlinux.org/CVE-2017-7837
https://security.archlinux.org/CVE-2017-7838
https://security.archlinux.org/CVE-2017-7839
https://security.archlinux.org/CVE-2017-7840
https://security.archlinux.org/CVE-2017-7842
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20171116/1d3fc68f/attachment.asc>
More information about the arch-security
mailing list