Linux Security
    Linux Security
    Linux Security

    ArchLinux: 202005-3: firefox: multiple issues

    Date
    319
    Posted By
    The package firefox before version 76.0-1 is vulnerable to multiple issues including arbitrary code execution, content spoofing and insufficient validation.
    Arch Linux Security Advisory ASA-202005-3
    =========================================
    
    Severity: Critical
    Date    : 2020-05-06
    CVE-ID  : CVE-2020-6831  CVE-2020-12387 CVE-2020-12390 CVE-2020-12391
              CVE-2020-12392 CVE-2020-12394 CVE-2020-12395 CVE-2020-12396
    Package : firefox
    Type    : multiple issues
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-1148
    
    Summary
    =======
    
    The package firefox before version 76.0-1 is vulnerable to multiple
    issues including arbitrary code execution, content spoofing and
    insufficient validation.
    
    Resolution
    ==========
    
    Upgrade to 76.0-1.
    
    # pacman -Syu "firefox>=76.0-1"
    
    The problems have been fixed upstream in version 76.0.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    - CVE-2020-6831 (arbitrary code execution)
    
    A buffer overflow could occur when parsing and validating SCTP chunks
    in WebRTC, in Firefox before 76.0 and chromium before 81.0.4044.138.
    This could have led to memory corruption and a potentially exploitable
    crash.
    
    - CVE-2020-12387 (arbitrary code execution)
    
    A race condition has been found in Firefox before 76.0, when running
    shutdown code for Web Worker, leading to a use-after-free
    vulnerability. This results in a potentially exploitable crash.
    
    - CVE-2020-12390 (insufficient validation)
    
    An incorrect origin serialization of URLs with IPv6 addresses issue has
    been found in Firefox before 76.0, and could lead to incorrect security
    checks.
    
    - CVE-2020-12391 (arbitrary code execution)
    
    Documents formed using data: URLs in an object element failed to
    inherit the CSP of the creating context in Firefox before 76.0. This
    allowed the execution of scripts that should have been blocked, albeit
    with a unique opaque origin.
    
    - CVE-2020-12392 (content spoofing)
    
    The 'Copy as cURL' feature of Devtools' network tab did not properly
    escape the HTTP POST data of a request in Firefox before 76.0, which
    can be controlled by the website. If a user used the 'Copy as cURL'
    feature and pasted the command into a terminal, it could have resulted
    in the disclosure of local files.
    
    - CVE-2020-12394 (content spoofing)
    
    A logic flaw has been found in the location bar implementation of
    Firefox before 76.0, and could have allowed a local attacker to spoof
    the current location by selecting a different origin and removing focus
    from the input element.
    
    - CVE-2020-12395 (arbitrary code execution)
    
    Several memory safety bugs has been found in Firefox before 76.0 and
    Firefox ESR before 68.8. Some of these bugs showed evidence of memory
    corruption and Mozilla presumes that with enough effort some of these
    could have been exploited to run arbitrary code.
    
    - CVE-2020-12396 (arbitrary code execution)
    
    Several memory safety bugs have been found in Firefox before 76.0. Some
    of these bugs showed evidence of memory corruption and Mozilla presumes
    that with enough effort some of these could have been exploited to run
    arbitrary code.
    
    Impact
    ======
    
    A remote attacker might be able to spoof content, bypass security
    checks and execute arbitrary code on the affected host.
    
    References
    ==========
    
    https://bugzilla.mozilla.org/show_bug.cgi?id=1632241
    https://crbug.com/1073602
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-6831
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-12387
    https://bugzilla.mozilla.org/show_bug.cgi?id=1545345
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-12390
    https://bugzilla.mozilla.org/show_bug.cgi?id=1141959
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-12391
    https://bugzilla.mozilla.org/show_bug.cgi?id=1457100
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-12392
    https://bugzilla.mozilla.org/show_bug.cgi?id=1614468
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-12394
    https://bugzilla.mozilla.org/show_bug.cgi?id=1628288
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-12395
    https://bugzilla.mozilla.org/buglist.cgi?bug_id=1595886%2C1611482%2C1614704%2C1624098%2C1625749%2C1626382%2C1628076%2C1631508
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-12396
    https://bugzilla.mozilla.org/buglist.cgi?bug_id=1339601%2C1611938%2C1620488%2C1622291%2C1627644
    https://security.archlinux.org/CVE-2020-6831
    https://security.archlinux.org/CVE-2020-12387
    https://security.archlinux.org/CVE-2020-12390
    https://security.archlinux.org/CVE-2020-12391
    https://security.archlinux.org/CVE-2020-12392
    https://security.archlinux.org/CVE-2020-12394
    https://security.archlinux.org/CVE-2020-12395
    https://security.archlinux.org/CVE-2020-12396
    
    

    Advisories

    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/38-which-aspect-of-server-security-are-you-most-interested-in-learning-more-about?task=poll.vote&format=json
    38
    radio
    [{"id":"131","title":"Preventing information leakage","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.