==========================================================================
Ubuntu Security Notice USN-2372-1
October 14, 2014
firefox vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
Firefox could be made to crash or run programs as your login if it
opened a malicious website.
Software Description:
– firefox: Mozilla Open Source web browser
Details:
Bobby Holley, Christian Holler, David Bolter, Byron Campen, Jon Coppeard,
Carsten Book, Martijn Wargers, Shih-Chiang Chien, Terrence Cole and
Jeff Walden discovered multiple memory safety issues in Firefox. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2014-1574, CVE-2014-1575)
Atte Kettunen discovered a buffer overflow during CSS manipulation. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to cause a denial of service via
application crash or execute arbitrary code with the privileges of the
user invoking Firefox. (CVE-2014-1576)
Holger Fuhrmannek discovered an out-of-bounds read with Web Audio. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to steal sensitive information.
(CVE-2014-1577)
Abhishek Arya discovered an out-of-bounds write when buffering WebM video
in some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash or execute arbitrary code with
the privileges of the user invoking Firefox. (CVE-2014-1578)
Michal Zalewski discovered that memory may not be correctly initialized
when rendering a malformed GIF in to a canvas in some circumstances. If
a user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to steal sensitive information.
(CVE-2014-1580)
A use-after-free was discovered during text layout in some circumstances.
If a user were tricked in to opening a specially crafted website, an
attacker could potentially exploit this to cause a denial of service via
application crash or execute arbitrary code with the privileges of the
user invoking Firefox. (CVE-2014-1581)
Patrick McManus and David Keeler discovered 2 issues that could result
in certificate pinning being bypassed in some circumstances. An attacker
with a fraudulent certificate could potentially exploit this conduct a
man in the middle attack. (CVE-2014-1582, CVE-2014-1584)
Eric Shepherd and Jan-Ivar Bruaroey discovered issues with video sharing
via WebRTC in iframes, where video continues to be shared after being
stopped and navigating to a new site doesn’t turn off the camera. An
attacker could potentially exploit this to access the camera without the
user being aware. (CVE-2014-1585, CVE-2014-1586)
Boris Zbarsky discovered that webapps could use the Alarm API to read the
values of cross-origin references. If a user were tricked in to installing
a specially crafter webapp, an attacker could potentially exploit this to
bypass same-origin restrictions. (CVE-2014-1583)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
firefox 33.0+build2-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
firefox 33.0+build2-0ubuntu0.12.04.1
After a standard system update you need to restart Firefox to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2372-1
CVE-2014-1574, CVE-2014-1575, CVE-2014-1576, CVE-2014-1577,
CVE-2014-1578, CVE-2014-1580, CVE-2014-1581, CVE-2014-1582,
CVE-2014-1583, CVE-2014-1584, CVE-2014-1585, CVE-2014-1586
Package Information:
https://launchpad.net/ubuntu/+source/firefox/33.0+build2-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/firefox/33.0+build2-0ubuntu0.12.04.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
iQEcBAEBAgAGBQJUPVyiAAoJEGEfvezVlG4PHCsIAIJeTBOWUpvyjl2V4V/DQgL+
mvUuricuWYMLpCgm2ckopVF9nykVB6k6SLovRkkGmqlBYSFLnM1x/5yck0gNE7TO
gUSwE8vzofEUsBClbYZ1QU5N6zggOw6eN5z0tSDtHHCC9e6xNcqBE03Sa34X/qNK
bY2Z/Mz+HxFgc6ZBYWakYg9E7YZZxWq0LflTV35LX2l1ouyT0CkERM/IPHjifiIm
q/0M4Stla/BS5os2pEIB/k5p6Z7P8JHR2PK4q+Y3wgh4V4Bx5L+cK/NT6g/boC39
T2OnnkZ9CzlBf+WZA9vepye5JjrUpq5fglgEuy31mEFydRBIE8emVicORWv4b0I=
=v3E+
—–END PGP SIGNATURE—–
—