You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa firefox

Sigurnosni nedostaci programskog paketa firefox

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2424-1
December 02, 2014

firefox vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Firefox could be made to crash or run programs as your login if it
opened a malicious website.

Software Description:
– firefox: Mozilla Open Source web browser

Details:

Gary Kwong, Randell Jesup, Nils Ohlmeier, Jesse Ruderman, Max Jonas
Werner, Christian Holler, Jon Coppeard, Eric Rahm, Byron Campen, Eric
Rescorla, and Xidorn Quan discovered multiple memory safety issues in
Firefox. If a user were tricked in to opening a specially crafted website,
an attacker could potentially exploit these to cause a denial of service
via application crash, or execute arbitrary code with the privileges of
the user invoking Firefox. (CVE-2014-1587, CVE-2014-1588)

Cody Crews discovered a way to trigger chrome-level XBL bindings from web
content in some circumstances. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
bypass security restrictions. (CVE-2014-1589)

Joe Vennix discovered a crash when using XMLHttpRequest in some
circumstances. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause a denial of
service. (CVE-2014-1590)

Muneaki Nishimura discovered that CSP violation reports did not remove
path information in some circumstances. If a user were tricked in to
opening a specially crafted website, an attacker could potentially
exploit this to obtain sensitive information. (CVE-2014-1591)

Berend-Jan Wever discovered a use-after-free during HTML parsing. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to cause a denial of service via
application crash or execute arbitrary code with the privileges of the
user invoking Firefox. (CVE-2014-1592)

Abhishek Arya discovered a buffer overflow when parsing media content. If
a user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to cause a denial of service via
application crash or execute arbitrary code with the privileges of the
user invoking Firefox. (CVE-2014-1593)

Byoungyoung Lee, Chengyu Song, and Taesoo Kim discovered a bad cast in the
compositor. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause undefined
behaviour, a denial of service via application crash or execute abitrary
code with the privileges of the user invoking Firefox. (CVE-2014-1594)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
firefox 34.0+build2-0ubuntu0.14.10.2

Ubuntu 14.04 LTS:
firefox 34.0+build2-0ubuntu0.14.04.1

Ubuntu 12.04 LTS:
firefox 34.0+build2-0ubuntu0.12.04.1

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2424-1
CVE-2014-1587, CVE-2014-1588, CVE-2014-1589, CVE-2014-1590,
CVE-2014-1591, CVE-2014-1592, CVE-2014-1593, CVE-2014-1594

Package Information:
https://launchpad.net/ubuntu/+source/firefox/34.0+build2-0ubuntu0.14.10.2
https://launchpad.net/ubuntu/+source/firefox/34.0+build2-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/firefox/34.0+build2-0ubuntu0.12.04.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQEcBAEBAgAGBQJUfd6rAAoJEGEfvezVlG4PG5kIAJ9o0mXUFL7nJicWlKV/WWS4
brzBMkQBnL61j+3NM59+adhTEk5a3cP6Cff9daEWLN+izkHwJrZKXQsgb7RXghdg
+t7WjgMoAwWUMmiQ5OHrdo5DY5OSBCjaci9JOe+ntX2A8RadoQZ/9GzEqsIssD+i
X9pQsdjcvboWPUHJ54+Oo2H0DVx/TBa4UqyufwE4N6t9O+84O6zTLw/TSf5/MaYa
8IkxIF2HFxTWg2nsCE90s6Of4UdlJD+34Qpl9UvfwzHaA+CwR2g8lvzJkuPVEMi0
6K77NhnC6alGtC/biv8IlaDWIb4v/6ePtcwUN/Hdr1G1O8b02Yb2c/dUUw4dAuI=
=x8DK
—–END PGP SIGNATURE—–

AutorMarijo Plepelic
Cert idNCERT-REF-2014-12-0024-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskih paketa nss, nss-util i nss-softokn

Ispravljen je sigurnosni nedostatak u programskim paketima nss, nss-util i nss-softokn. Nedostatak je uzrokovan ranjivim SSL 3.0 protokolom i potencijalnim...

Close