Computer Security
[EN] securityvulns.ru no-pyccku


Mozilla Firefox / Thunderbird / Seamonkey multiple security vulnerabilities
updated since 07.03.2015
Published:22.03.2015
Source:
SecurityVulns ID:14293
Type:client
Threat Level:
9/10
Description:Restrictions bypass, information spoofing, information leakage, buffer overflows, memory corruptions, DoS, code execution.
Affected:MOZILLA : Firefox ESR 31.4
 MOZILLA : Firefox 35
 MOZILLA : Thunderbird 31.4
CVE:CVE-2015-0836 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2015-0835 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2015-0834 (The WebRTC subsystem in Mozilla Firefox before 36.0 recognizes turns: and stuns: URIs but accesses the TURN or STUN server without using TLS, which makes it easier for man-in-the-middle attackers to discover credentials by spoofing a server and completing a brute-force attack within a short time window.)
 CVE-2015-0833 (Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 on Windows, when the Maintenance Service is not used, allow local users to gain privileges via a Trojan horse DLL in (1) the current working directory or (2) a temporary directory, as demonstrated by bcrypt.dll.)
 CVE-2015-0832 (Mozilla Firefox before 36.0 does not properly recognize the equivalence of domain names with and without a trailing . (dot) character, which allows man-in-the-middle attackers to bypass the HPKP and HSTS protection mechanisms by constructing a URL with this character and leveraging access to an X.509 certificate for a domain with this character.)
 CVE-2015-0831 (Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation.)
 CVE-2015-0830 (The WebGL implementation in Mozilla Firefox before 36.0 does not properly allocate memory for copying an unspecified string to a shader's compilation log, which allows remote attackers to cause a denial of service (application crash) via crafted WebGL content.)
 CVE-2015-0829 (Buffer overflow in libstagefright in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code via a crafted MP4 video that is improperly handled during playback.)
 CVE-2015-0828 (Double free vulnerability in the nsXMLHttpRequest::GetResponse function in Mozilla Firefox before 36.0, when a nonstandard memory allocator is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted JavaScript code that makes an XMLHttpRequest call with zero bytes of data.)
 CVE-2015-0827 (Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic.)
 CVE-2015-0826 (The nsTransformedTextRun::SetCapitalization function in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read of heap memory) via a crafted Cascading Style Sheets (CSS) token sequence that triggers a restyle or reflow operation.)
 CVE-2015-0825 (Stack-based buffer underflow in the mozilla::MP3FrameParser::ParseBuffer function in Mozilla Firefox before 36.0 allows remote attackers to obtain sensitive information from process memory via a malformed MP3 file that improperly interacts with memory allocation during playback.)
 CVE-2015-0824 (The mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 36.0 allows remote attackers to cause a denial of service (out-of-bounds write of zero values, and application crash) via vectors that trigger use of DrawTarget and the Cairo library for image drawing.)
 CVE-2015-0823 (Multiple use-after-free vulnerabilities in OpenType Sanitiser, as used in Mozilla Firefox before 36.0, might allow remote attackers to trigger problematic Developer Console information or possibly have unspecified other impact by leveraging incorrect macro expansion, related to the ots::ots_gasp_parse function.)
 CVE-2015-0822 (The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.)
 CVE-2015-0821 (Mozilla Firefox before 36.0 allows user-assisted remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions.)
 CVE-2015-0820 (Mozilla Firefox before 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote attackers to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript sandbox protection mechanism via a crafted web site.)
 CVE-2015-0819 (The UITour::onPageEvent function in Mozilla Firefox before 36.0 does not ensure that an API call originates from a foreground tab, which allows remote attackers to conduct spoofing and clickjacking attacks by leveraging access to a UI Tour web site.)
 CVE-2015-0818 (Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.)
 CVE-2015-0817 (The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.)
Files: Mozilla Foundation Security Advisory 2015-11 Miscellaneous memory safety hazards (rv:36.0 / rv:31.5)
  Mozilla Foundation Security Advisory 2015-12 Invoking Mozilla updater will load locally stored DLL files
  Mozilla Foundation Security Advisory 2015-13 Appended period to hostnames can bypass HPKP and HSTS protections
  Mozilla Foundation Security Advisory 2015-14 Malicious WebGL content crash when writing strings
  Mozilla Foundation Security Advisory 2015-15 TLS TURN and STUN connections silently fail to simple TCP connections
  Mozilla Foundation Security Advisory 2015-16 Use-after-free in IndexedDB
 Buffer overflow in libstagefright during MP4 video playback
  Mozilla Foundation Security Advisory 2015-18 Double-free when using non-default memory allocators with a zero-length XHR
  Mozilla Foundation Security Advisory 2015-19 Out-of-bounds read and write while rendering SVG content
  Mozilla Foundation Security Advisory 2015-20 Buffer overflow during CSS restyling
  Mozilla Foundation Security Advisory 2015-21 Buffer underflow during MP3 playback
  Mozilla Foundation Security Advisory 2015-22 Crash using DrawTarget in Cairo graphics library
  Mozilla Foundation Security Advisory 2015-23 Use-after-free in Developer Console date with OpenType Sanitiser
  Mozilla Foundation Security Advisory 2015-24 Reading of local files through manipulation of form autocomplete
  Mozilla Foundation Security Advisory 2015-25 Local files or privileged URLs in pages can be opened into new tabs
  Mozilla Foundation Security Advisory 2015-26 UI Tour whitelisted sites in background tab can spoof foreground tabs
  Mozilla Foundation Security Advisory 2015-27 Caja Compiler JavaScript sandbox bypass
  Mozilla Foundation Security Advisory 2015-28 Privilege escalation through SVG navigation
  Mozilla Foundation Security Advisory 2015-29 Code execution through incorrect JavaScript bounds checking elimination

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod