Ubuntu 2424-1: Firefox vulnerabilities

    Date02 Dec 2014
    CategoryUbuntu
    38
    Posted ByLinuxSecurity Advisories
    Firefox could be made to crash or run programs as your login if it opened a malicious website.
    ==========================================================================
    Ubuntu Security Notice USN-2424-1
    December 02, 2014
    
    firefox vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 14.10
    - Ubuntu 14.04 LTS
    - Ubuntu 12.04 LTS
    
    Summary:
    
    Firefox could be made to crash or run programs as your login if it
    opened a malicious website.
    
    Software Description:
    - firefox: Mozilla Open Source web browser
    
    Details:
    
    Gary Kwong, Randell Jesup, Nils Ohlmeier, Jesse Ruderman, Max Jonas
    Werner, Christian Holler, Jon Coppeard, Eric Rahm, Byron Campen, Eric
    Rescorla, and Xidorn Quan discovered multiple memory safety issues in
    Firefox. If a user were tricked in to opening a specially crafted website,
    an attacker could potentially exploit these to cause a denial of service
    via application crash, or execute arbitrary code with the privileges of
    the user invoking Firefox. (CVE-2014-1587, CVE-2014-1588)
    
    Cody Crews discovered a way to trigger chrome-level XBL bindings from web
    content in some circumstances. If a user were tricked in to opening a
    specially crafted website, an attacker could potentially exploit this to
    bypass security restrictions. (CVE-2014-1589)
    
    Joe Vennix discovered a crash when using XMLHttpRequest in some
    circumstances. If a user were tricked in to opening a specially crafted
    website, an attacker could potentially exploit this to cause a denial of
    service. (CVE-2014-1590)
    
    Muneaki Nishimura discovered that CSP violation reports did not remove
    path information in some circumstances. If a user were tricked in to
    opening a specially crafted website, an attacker could potentially
    exploit this to obtain sensitive information. (CVE-2014-1591)
    
    Berend-Jan Wever discovered a use-after-free during HTML parsing. If a
    user were tricked in to opening a specially crafted website, an attacker
    could potentially exploit this to cause a denial of service via
    application crash or execute arbitrary code with the privileges of the
    user invoking Firefox. (CVE-2014-1592)
    
    Abhishek Arya discovered a buffer overflow when parsing media content. If
    a user were tricked in to opening a specially crafted website, an attacker
    could potentially exploit this to cause a denial of service via
    application crash or execute arbitrary code with the privileges of the
    user invoking Firefox. (CVE-2014-1593)
    
    Byoungyoung Lee, Chengyu Song, and Taesoo Kim discovered a bad cast in the
    compositor. If a user were tricked in to opening a specially crafted
    website, an attacker could potentially exploit this to cause undefined
    behaviour, a denial of service via application crash or execute abitrary
    code with the privileges of the user invoking Firefox. (CVE-2014-1594)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 14.10:
      firefox                         34.0+build2-0ubuntu0.14.10.2
    
    Ubuntu 14.04 LTS:
      firefox                         34.0+build2-0ubuntu0.14.04.1
    
    Ubuntu 12.04 LTS:
      firefox                         34.0+build2-0ubuntu0.12.04.1
    
    After a standard system update you need to restart Firefox to make
    all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-2424-1
      CVE-2014-1587, CVE-2014-1588, CVE-2014-1589, CVE-2014-1590,
      CVE-2014-1591, CVE-2014-1592, CVE-2014-1593, CVE-2014-1594
    
    Package Information:
      https://launchpad.net/ubuntu/+source/firefox/34.0+build2-0ubuntu0.14.10.2
      https://launchpad.net/ubuntu/+source/firefox/34.0+build2-0ubuntu0.14.04.1
      https://launchpad.net/ubuntu/+source/firefox/34.0+build2-0ubuntu0.12.04.1
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.11,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":33.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.