==========================================================================
Ubuntu Security Notice USN-2602-1
May 13, 2015
firefox vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 15.04
– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
Firefox could be made to crash or run programs as your login if it
opened a malicious website.
Software Description:
– firefox: Mozilla Open Source web browser
Details:
Jesse Ruderman, Mats Palmgren, Byron Campen, Steve Fink, Gary Kwong,
Andrew McCreight, Christian Holler, Jon Coppeard, and Milan Sreckovic
discovered multiple memory safety issues in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2015-2708, CVE-2015-2709)
Atte Kettunen discovered a buffer overflow during the rendering of SVG
content with certain CSS properties in some circumstances. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2015-2710)
Alex Verstak discovered that <meta name=”referrer”> is ignored in some
circumstances. (CVE-2015-2711)
Dougall Johnson discovered an out of bounds read and write in asm.js. If
a user were tricked in to opening a specially crafted website, an
attacker could potentially exploit this to obtain sensitive information,
cause a denial of service via application crash, or execute arbitrary
code with the privileges of the user invoking Firefox. (CVE-2015-2712)
Scott Bell discovered a use-afer-free during the processing of text when
vertical text is enabled. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash, or execute arbitrary code with
the privileges of the user invoking Firefox. (CVE-2015-2713)
Tyson Smith and Jesse Schwartzentruber discovered a use-after-free during
shutdown. An attacker could potentially exploit this to cause a denial of
service via application crash, or execute arbitrary code with the
privileges of the user invoking Firefox. (CVE-2015-2715)
Ucha Gobejishvili discovered a buffer overflow when parsing compressed XML
content. If a user were tricked in to opening a specially crafted website,
an attacker could potentially exploit this to cause a denial of service
via application crash, or execute arbitrary code with the privileges of
the user invoking Firefox. (CVE-2015-2716)
A buffer overflow and out-of-bounds read were discovered when parsing
metadata in MP4 files in some circumstances. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via application crash, or execute
arbitrary code with the privileges of the user invoking Firefox.
(CVE-2015-2717)
Mark Hammond discovered that when a trusted page is hosted within an
iframe in an untrusted page, the untrusted page can intercept webchannel
responses meant for the trusted page in some circumstances. If a user
were tricked in to opening a specially crafted website, an attacker could
exploit this to bypass origin restrictions. (CVE-2015-2718)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
firefox 38.0+build3-0ubuntu0.15.04.1
Ubuntu 14.10:
firefox 38.0+build3-0ubuntu0.14.10.1
Ubuntu 14.04 LTS:
firefox 38.0+build3-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
firefox 38.0+build3-0ubuntu0.12.04.1
After a standard system update you need to restart Firefox to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2602-1
CVE-2015-2708, CVE-2015-2709, CVE-2015-2710, CVE-2015-2711,
CVE-2015-2712, CVE-2015-2713, CVE-2015-2715, CVE-2015-2716,
CVE-2015-2717, CVE-2015-2718
Package Information:
https://launchpad.net/ubuntu/+source/firefox/38.0+build3-0ubuntu0.15.04.1
https://launchpad.net/ubuntu/+source/firefox/38.0+build3-0ubuntu0.14.10.1
https://launchpad.net/ubuntu/+source/firefox/38.0+build3-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/firefox/38.0+build3-0ubuntu0.12.04.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
iQEcBAEBAgAGBQJVU410AAoJEGEfvezVlG4PxBoH/22BzZ5fTHsn0TuRGE8bkkrM
vz3jIuSBKJFoLc6twXEjdq0J/2Ihah6sDBVXkVb4HZ7qp92Ua79B2dqzgBI8vYuU
Jy2SbeXcVj/pJxIO4ZFGtUBkq71bwQXkxWJNmUxyU/O2HPft1ZWU5diyB+q7aORn
fcyNz3lbB2eBgWlxrX6tf9ogfAzd4kHd+jA0vZivTb3/8+f8xMQtztkDouUiRI2s
3dqXjXK0urlbOOGiBOJecRczVPmoRCRw6lUNRdGC47J9x70b5T8sx1tQZ8noYSUF
fpLuxqGJcRQHxN+kgNcfGC1BoH/7UuzdLdyXJJfWLolVEd33ouzC1u5Nqdl8VTI=
=MYgW
—–END PGP SIGNATURE—–
—