Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, and compromise a user's system.
1) Several unspecified errors in the browser engine can be exploited to corrupt memory.
2) An error when handling the "<select>" dropdown menu can be exploited to display arbitrary content while showing the URL of another site.
3) An error when handling the "document.domain" properly can be exploited to bypass the same origin policy and e.g. execute script code in the context of another domain.
4) Some errors can be exploited to bypass checks for the DOMWindowUtils class and call restricted methods.
5) An error when transitioning into Reader Mode does not properly sanitise content and can be exploited to conduct cross-site scripting attacks.
Note: This vulnerability only affects Firefox for Android.
6) A use-after-free error exists when invoking full screen mode and navigating backwards in history.
8) An error when invoking the "GetProperty()" function via JSAPI can be exploited to bypass certain checks and execute arbitrary code.
9) An error when handling the "location" property via binary plugins can be exploited to conduct cross-site scripting attacks.
10) An error within Chrome Object Wrapper (COW) when handling the "InstallTrigger" object can be exploited to access certain privileged functions and properties.
11) An error when handling the "location.hash" property and history navigation can be exploited to e.g. display an arbitrary site or execute arbitrary script code.
12) An out-of-bounds read error exists within the "IsCSSWordSpacingSpace()" function.
13) A use-after-free error exists within the "nsHTMLCSSUtils::CreateCSSPropertyTxn()" function.
14) An error within the "nsHTMLEditor::IsPrevCharInNodeWhitespace()" function can be exploited to cause a heap-based buffer overflow.
15) A use-after-free error exists within the "nsSMILAnimationController::DoSample()" function.
16) A use-after-free error exists within the "nsTextEditRules::WillInsert()" function.
17) A use-after-free error exists within the "DOMSVGTests::GetRequiredFeatures()" function.
18) An error within the "nsCharTraits::length()" function can be exploited to cause a buffer overflow.
19) An error within the "nsWaveReader::DecodeAudioData()" function can be exploited to cause a heap-based buffer overflow.
20) An error within the "insPos" property can be exploited to corrupt memory.
21) An error within the "Convolve3x3()" function can be exploited to cause a heap-based buffer overflow.
22) A use-after-free error exists within the "nsIContent::GetNameSpaceID()" function.
Solution: Upgrade to version 16.
Provided and/or discovered by: The vendor credits:
1) Henrik Skupin, Jesse Ruderman, moz_bug_r_a4, Christian Holler, and Jesse Ruderman.
2) David Bloom, Cue
3) Collin Jackson
4) Johnny Stenback
5) Warren He
6) Soroush Dalili
8) Alice White
9, 10, 11) Mariusz Mlynski
12 - 17) Abhishek Arya (Inferno), Google Chrome Security Team
18 - 21) Atte Kettunen, OUSPG
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Mozilla Firefox / Thunderbird Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.