Skip Ribbon Commands
Skip to main content
Computer Security Incident Response Team of Mauritius (CERT-MU)

VN-2017-16


Multiple vulnerabilities in Mozilla Firefox
Severity Rating: High
System Affected:  
 
  • Version(s): prior to 51.0
Description:
Multiple vulnerabilities have been identified in Mozilla Firefox and can be exploited by remote attackers to cause arbitrary code to be executed on the target user's system, gain elevated privileges, bypass security controls on the target system and obtain potentially sensitive information on the target system. The vulnerabilities reported are as follows:
  • A vulnerability exists due to a use-after-free memory error in XSL when processing XSLT documents, Web Animations when interacting with cycle collection, processing SVG content and Media Decoder
 
  • A vulnerability exists due to memory corruption error in Skia when using transforms to make gradients
  • A vulnerability exists that can allow a remote user to exploit a proxy object thread reference flaw to potentially execute arbitrary code.
  • A vulnerability exists where a remote user can spoof URLs using certain unicode glyphs for alternative hyphens and quotes
  • A vulnerability exists that can allow  a remote user to exploit a JIT code allocation flaw to bypass address space layout randomization (ASLR) and data execution prevention (DEP) security features
  • A vulnerability exists where a remote user can determine an object's address via shared hash codes
  • A vulnerability exists that can allow  a remote user to monitor the network may be able to view potentially sensitive information in JSON and HTTP headers sent to the target user's JSON viewer in Developer Tools
  • A vulnerability exists where a remote user can cause the Certificate Viewer to save an exported certificate to arbitrary filesystem locations
  • A vulnerability exists that can allow remote user to exploit a flaw in the feed preview feature for RSS feeds to view errors and exceptions generated by privileged content
  • A vulnerability exists where a remote user can exploit a Proxy Auto-Config bug to obtain potentially sensitive information
  • A vulnerability exists that can cause the browser to ignore the referrer-policy response header in certain cases
  • A vulnerability exists that can allow a remote user to invoke TRACK tag errors to determine if a specified file exists on the target system
  • A vulnerability exists where a remote user can use a STUN server in conjunction with a large number of webkitRTCPeerConnection objects to conduct denial of service attacks against other systems
 
  • A vulnerability occurs when a specially crafted WebExtension script invoke the 'data:' protocol to access data from pages loaded by other web extensions or gain elevated privileges
  • A vulnerability exists when a specially crafted 'about:' page can load privileged 'about:' pages to potentially gain elevated privileges
  • A vulnerability occurs when a specially crafted extension invoke mozAddonManager to install additional extensions.
  • A vulnerability occurs when a specially crafted CSP header can invoke the mozAddonManager API to install additional add-ons
 
Source:
Solution
Users are advised to apply updates.
More information is available on:
Mozilla
 
Vendor Information
Mozilla
 
CVE Information
 
More CVE available on:
 
References
Security Tracker
 
Contact Information
 
Postal address
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street
Port Louis