Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities
Last Update Date:
6 Feb 2014 15:27
Release Date:
6 Feb 2014
4224
Views
RISK: High Risk
TYPE: Clients - Browsers
Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.
- Errors when handling discarded images within the "RasterImage" class, terminating a web worker running asm.js code after passing an object between threads, and some unspecified errors can be exploited to cause memory corruption.
- A use-after-free error related to certain content types when used with the "imgRequestProxy()" function can be exploited to cause memory corruption.
- A race condition error when handling session tickets within libssl can be exploited to e.g. cause memory corruption.
- An error when handling XML Binding Language (XBL) content scopes can be exploited to bypass System Only Wrappers (SOW) by using XBL content scopes to clone protected XUL elements.
- An error related to the "document.caretPositionFromPoint()" and "document.elementFromPoint()" functions can be exploited to bypass the same-origin policy and subsequently e.g. potentially disclose certain attributes of an iframe element.
- An error when handling web workers' error messages can be exploited to bypass the same-origin policy and subsequently e.g. disclose otherwise inaccessible information.
- An error when handling XSLT stylesheets can be exploited to bypass Content Security Policy (CSP) and subsequently e.g. execute arbitrary script code.
- An error when handling JavaScript native getters on window objects can be exploited to e.g. bypass certain unspecified security restrictions.
- A weakness exists when handling the dialog for saving downloaded files, which can potentially be exploited to e.g. cause downloaded files to be opened via clickjacking attacks.
Impact
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- Firefox versions prior to 27 and ESR versions prior to 24.3
- Thunderbird versions prior to 24.3
- SeaMonkey versions prior to 2.24
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to a fixed version.
Vulnerability Identifier
- CVE-2014-1477
- CVE-2014-1478
- CVE-2014-1479
- CVE-2014-1480
- CVE-2014-1481
- CVE-2014-1482
- CVE-2014-1483
- CVE-2014-1485
- CVE-2014-1486
- CVE-2014-1487
- CVE-2014-1488
- CVE-2014-1489
- CVE-2014-1490
- CVE-2014-1491
- CVE-2014-1484
Source
Related Link
Share with