USN-3044-1: Firefox vulnerabilities
5 August 2016
Firefox could be made to crash or run programs as your login if it opened a malicious website.
Releases
Packages
- firefox - Mozilla Open Source web browser
Details
Gustavo Grieco discovered an out-of-bounds read during XML parsing in
some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash, or obtain sensitive information.
(CVE-2016-0718)
Toni Huttunen discovered that once a favicon is requested from a site,
the remote server can keep the network connection open even after the page
is closed. A remote attacked could potentially exploit this to track
users, resulting in information disclosure. (CVE-2016-2830)
Christian Holler, Tyson Smith, Boris Zbarsky, Byron Campen, Julian Seward,
Carsten Book, Gary Kwong, Jesse Ruderman, Andrew McCreight, and Phil
Ringnalda discovered multiple memory safety issues in Firefox. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via application
crash, or execute arbitrary code. (CVE-2016-2835, CVE-2016-2836)
A buffer overflow was discovered in the ClearKey Content Decryption
Module (CDM) during video playback. If a user were tricked in to opening
a specially crafted website, an attacker could potentially exploit this to
cause a denial of service via plugin process crash, or, in combination
with another vulnerability to escape the GMP sandbox, execute arbitrary
code. (CVE-2016-2837)
Atte Kettunen discovered a buffer overflow when rendering SVG content in
some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash, or execute arbitrary code.
(CVE-2016-2838)
Bert Massop discovered a crash in Cairo with version 0.10 of FFmpeg. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to execute arbitrary code. (CVE-2016-2839)
Catalin Dumitru discovered that URLs of resources loaded after a
navigation start could be leaked to the following page via the Resource
Timing API. An attacker could potentially exploit this to obtain sensitive
information. (CVE-2016-5250)
Firas Salem discovered an issue with non-ASCII and emoji characters in
data: URLs. An attacker could potentially exploit this to spoof the
addressbar contents. (CVE-2016-5251)
Georg Koppen discovered a stack buffer underflow during 2D graphics
rendering in some circumstances. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
cause a denial of service via application crash, or execute arbitrary
code. (CVE-2016-5252)
Abhishek Arya discovered a use-after-free when the alt key is used with
top-level menus. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause a denial of
service via application crash, or execute arbitrary code. (CVE-2016-5254)
Jukka Jylänki discovered a crash during garbage collection. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit this to execute arbitrary code. (CVE-2016-5255)
Looben Yang discovered a use-after-free in WebRTC. If a user were tricked
in to opening a specially crafted website, an attacker could potentially
exploit this to cause a denial of service via application crash, or
execute arbitrary code. (CVE-2016-5258)
Looben Yang discovered a use-after-free when working with nested sync
events in service workers. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
cause a denial of service via application crash, or execute arbitrary
code. (CVE-2016-5259)
Mike Kaply discovered that plain-text passwords can be stored in session
restore if an input field type is changed from "password" to "text" during
a session, leading to information disclosure. (CVE-2016-5260)
Samuel Groß discovered an integer overflow in WebSockets during data
buffering in some circumstances. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
cause a denial of service via application crash, or execute arbitrary
code. (CVE-2016-5261)
Nikita Arykov discovered that JavaScript event handlers on a
A type confusion bug was discovered in display transformation during
rendering. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause a denial of
service via application crash, or execute arbitrary code. (CVE-2016-5263)
A use-after-free was discovered when applying effects to SVG elements in
some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash, or execute arbitrary code.
(CVE-2016-5264)
Abdulrahman Alqabandi discovered a same-origin policy violation relating
to local HTML files and saved shortcut files. An attacker could
potentially exploit this to obtain sensitive information. (CVE-2016-5265)
Rafael Gieschke discovered an information disclosure issue related to
drag and drop. An attacker could potentially exploit this to obtain
sensitive information. (CVE-2016-5266)
A text injection issue was discovered with about: URLs. An attacker could
potentially exploit this to spoof internal error pages. (CVE-2016-5268)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
Ubuntu 14.04
Ubuntu 12.04
After a standard system update you need to restart Firefox to make
all the necessary changes.
References
- CVE-2016-0718
- CVE-2016-2830
- CVE-2016-2835
- CVE-2016-2836
- CVE-2016-2837
- CVE-2016-2838
- CVE-2016-2839
- CVE-2016-5250
- CVE-2016-5251
- CVE-2016-5252
- CVE-2016-5254
- CVE-2016-5255
- CVE-2016-5258
- CVE-2016-5259
- CVE-2016-5260
- CVE-2016-5261
- CVE-2016-5262
- CVE-2016-5263
- CVE-2016-5264
- CVE-2016-5265
- CVE-2016-5266
- CVE-2016-5268
Related notices
- USN-3013-1: libxmlrpc-c++4, xmlrpc-c, libxmlrpc-core-c3
- USN-2983-1: expat, lib64expat1, libexpat1, libexpat1-udeb, libexpat1-dev, lib64expat1-dev
- USN-5455-1: libxmltok, libxmltok1, libxmltok1-dev
- USN-3073-1: thunderbird-locale-hu, thunderbird-locale-ta, thunderbird-locale-ja, thunderbird-locale-es, thunderbird, thunderbird-locale-el, thunderbird-locale-gd, thunderbird-locale-vi, thunderbird-locale-it, thunderbird-locale-ko, xul-ext-gdata-provider, thunderbird-locale-ro, thunderbird-locale-cy, xul-ext-lightning, thunderbird-dev, thunderbird-locale-pa, thunderbird-locale-ta-lk, thunderbird-locale-ga-ie, thunderbird-locale-eu, thunderbird-locale-sv-se, thunderbird-locale-fi, thunderbird-locale-pt-pt, thunderbird-locale-nl, thunderbird-globalmenu, thunderbird-locale-br, thunderbird-locale-da, thunderbird-locale-hy, thunderbird-locale-zh-hant, thunderbird-locale-en-us, thunderbird-locale-bg, thunderbird-locale-cs, thunderbird-locale-gl, thunderbird-locale-af, thunderbird-locale-sk, thunderbird-locale-fr, thunderbird-gnome-support, thunderbird-locale-pt-br, thunderbird-locale-nn, xul-ext-calendar-timezones, thunderbird-locale-bn, thunderbird-locale-pa-in, thunderbird-locale-dsb, thunderbird-locale-si, thunderbird-locale-es-es, thunderbird-locale-sl, thunderbird-locale-hr, thunderbird-locale-bn-bd, thunderbird-locale-be, thunderbird-locale-ru, thunderbird-locale-mk, thunderbird-locale-nn-no, thunderbird-locale-hsb, thunderbird-locale-is, thunderbird-locale-nb, thunderbird-locale-uk, thunderbird-locale-pl, thunderbird-locale-ast, thunderbird-locale-lt, thunderbird-locale-sq, thunderbird-locale-sr, thunderbird-locale-ca, thunderbird-locale-zh-cn, thunderbird-locale-en, thunderbird-testsuite, thunderbird-mozsymbols, thunderbird-locale-he, thunderbird-locale-es-ar, thunderbird-locale-rm, thunderbird-locale-fy-nl, thunderbird-locale-en-gb, thunderbird-locale-ar, thunderbird-locale-et, thunderbird-locale-sv, thunderbird-locale-zh-tw, thunderbird-locale-ka, thunderbird-locale-de, thunderbird-locale-tr, thunderbird-locale-ga, thunderbird-locale-pt, thunderbird-locale-fy, thunderbird-locale-nb-no, thunderbird-locale-zh-hans, thunderbird-locale-id
- USN-3112-1: thunderbird-locale-hu, thunderbird-locale-ta, thunderbird-locale-ja, thunderbird-locale-es, thunderbird, thunderbird-locale-el, thunderbird-locale-gd, thunderbird-locale-vi, thunderbird-locale-it, thunderbird-locale-ko, xul-ext-gdata-provider, thunderbird-locale-ro, thunderbird-locale-cy, xul-ext-lightning, thunderbird-dev, thunderbird-locale-pa, thunderbird-locale-ta-lk, thunderbird-locale-ga-ie, thunderbird-locale-eu, thunderbird-locale-sv-se, thunderbird-locale-fi, thunderbird-locale-pt-pt, thunderbird-locale-nl, thunderbird-globalmenu, thunderbird-locale-br, thunderbird-locale-da, thunderbird-locale-hy, thunderbird-locale-zh-hant, thunderbird-locale-en-us, thunderbird-locale-bg, thunderbird-locale-cs, thunderbird-locale-gl, thunderbird-locale-af, thunderbird-locale-sk, thunderbird-locale-fr, thunderbird-gnome-support, thunderbird-locale-pt-br, thunderbird-locale-nn, xul-ext-calendar-timezones, thunderbird-locale-bn, thunderbird-locale-pa-in, thunderbird-locale-dsb, thunderbird-locale-si, thunderbird-locale-es-es, thunderbird-locale-sl, thunderbird-locale-hr, thunderbird-locale-bn-bd, thunderbird-locale-be, thunderbird-locale-ru, thunderbird-locale-mk, thunderbird-locale-nn-no, thunderbird-locale-hsb, thunderbird-locale-is, thunderbird-locale-nb, thunderbird-locale-uk, thunderbird-locale-pl, thunderbird-locale-ast, thunderbird-locale-lt, thunderbird-locale-sq, thunderbird-locale-sr, thunderbird-locale-ca, thunderbird-locale-zh-cn, thunderbird-locale-en, thunderbird-testsuite, thunderbird-mozsymbols, thunderbird-locale-he, thunderbird-locale-es-ar, thunderbird-locale-rm, thunderbird-locale-fy-nl, thunderbird-locale-en-gb, thunderbird-locale-ar, thunderbird-locale-et, thunderbird-locale-sv, thunderbird-locale-zh-tw, thunderbird-locale-ka, thunderbird-locale-de, thunderbird-locale-tr, thunderbird-locale-ga, thunderbird-locale-pt, thunderbird-locale-fy, thunderbird-locale-nb-no, thunderbird-locale-zh-hans, thunderbird-locale-id