You are here
Home > Preporuke > Nadogradnja za firefox

Nadogradnja za firefox

  • Detalji os-a: LUB
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2372-1
October 14, 2014

firefox vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Firefox could be made to crash or run programs as your login if it
opened a malicious website.

Software Description:
– firefox: Mozilla Open Source web browser

Details:

Bobby Holley, Christian Holler, David Bolter, Byron Campen, Jon Coppeard,
Carsten Book, Martijn Wargers, Shih-Chiang Chien, Terrence Cole and
Jeff Walden discovered multiple memory safety issues in Firefox. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2014-1574, CVE-2014-1575)

Atte Kettunen discovered a buffer overflow during CSS manipulation. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to cause a denial of service via
application crash or execute arbitrary code with the privileges of the
user invoking Firefox. (CVE-2014-1576)

Holger Fuhrmannek discovered an out-of-bounds read with Web Audio. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to steal sensitive information.
(CVE-2014-1577)

Abhishek Arya discovered an out-of-bounds write when buffering WebM video
in some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash or execute arbitrary code with
the privileges of the user invoking Firefox. (CVE-2014-1578)

Michal Zalewski discovered that memory may not be correctly initialized
when rendering a malformed GIF in to a canvas in some circumstances. If
a user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to steal sensitive information.
(CVE-2014-1580)

A use-after-free was discovered during text layout in some circumstances.
If a user were tricked in to opening a specially crafted website, an
attacker could potentially exploit this to cause a denial of service via
application crash or execute arbitrary code with the privileges of the
user invoking Firefox. (CVE-2014-1581)

Patrick McManus and David Keeler discovered 2 issues that could result
in certificate pinning being bypassed in some circumstances. An attacker
with a fraudulent certificate could potentially exploit this conduct a
man in the middle attack. (CVE-2014-1582, CVE-2014-1584)

Eric Shepherd and Jan-Ivar Bruaroey discovered issues with video sharing
via WebRTC in iframes, where video continues to be shared after being
stopped and navigating to a new site doesn’t turn off the camera. An
attacker could potentially exploit this to access the camera without the
user being aware. (CVE-2014-1585, CVE-2014-1586)

Boris Zbarsky discovered that webapps could use the Alarm API to read the
values of cross-origin references. If a user were tricked in to installing
a specially crafter webapp, an attacker could potentially exploit this to
bypass same-origin restrictions. (CVE-2014-1583)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
firefox 33.0+build2-0ubuntu0.14.04.1

Ubuntu 12.04 LTS:
firefox 33.0+build2-0ubuntu0.12.04.1

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2372-1
CVE-2014-1574, CVE-2014-1575, CVE-2014-1576, CVE-2014-1577,
CVE-2014-1578, CVE-2014-1580, CVE-2014-1581, CVE-2014-1582,
CVE-2014-1583, CVE-2014-1584, CVE-2014-1585, CVE-2014-1586

Package Information:
https://launchpad.net/ubuntu/+source/firefox/33.0+build2-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/firefox/33.0+build2-0ubuntu0.12.04.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQEcBAEBAgAGBQJUPVyiAAoJEGEfvezVlG4PHCsIAIJeTBOWUpvyjl2V4V/DQgL+
mvUuricuWYMLpCgm2ckopVF9nykVB6k6SLovRkkGmqlBYSFLnM1x/5yck0gNE7TO
gUSwE8vzofEUsBClbYZ1QU5N6zggOw6eN5z0tSDtHHCC9e6xNcqBE03Sa34X/qNK
bY2Z/Mz+HxFgc6ZBYWakYg9E7YZZxWq0LflTV35LX2l1ouyT0CkERM/IPHjifiIm
q/0M4Stla/BS5os2pEIB/k5p6Z7P8JHR2PK4q+Y3wgh4V4Bx5L+cK/NT6g/boC39
T2OnnkZ9CzlBf+WZA9vepye5JjrUpq5fglgEuy31mEFydRBIE8emVicORWv4b0I=
=v3E+
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2014-10-0004-ADV
CveCVE-2014-1574 CVE-2014-1575 CVE-2014-1576 CVE-2014-1577 CVE-2014-1578 CVE-2014-1580 CVE-2014-1581 CVE-2014-1582 CVE-2014-1584 CVE-2014-1585 CVE-2014-1586 CVE-2014-1583
ID izvornikaUSN-2372-1
Proizvodfirefox
Izvorhttp://www.ubuntu.com
Top
More in Preporuke
Višestruke ranjivosti programskog paketa oxide-qt

Otkrivene su višestruke ranjivosti u biblioteci mehanizma web preglednika za Qt - oxide-qt, distribuirane s Ubuntu 14.04 LTS. Ranjivosti zahvaćaju...

Close