Business

News

 
More...

Alerts

 
More...

Events

 
More...
 
     
 

Multiple Vulnerabilities in Mozilla Products

 

Systems Affected


Mozilla Firefox prior to 33.0
Mozilla Firefox ESR prior to 31.2
Mozilla Thunderbird prior to 31.2

Threat Level


High


Overview


Multiple vulnerabilities have been reported in Mozilla Products which could be exploited by remote attackers to disclose sensitive information, execute arbitrary code or cause Denial of Service (DoS) conditions on the affected systems.


Description


1. Memory Corruption Vulnerability ( CVE-2014-1574 )
This vulnerability exists in Mozilla products due to improper handling of memory safety bugs within the browser engine. A remote attacker could exploit this vulnerability by enticing the user to visit a specially crafted website to execute arbitrary code via unknown vectors or cause a denial of service condition.

2. Memory Corruption Vulnerability ( CVE-2014-1575 )
This vulnerability exists in Mozilla Firefox due to an improper interaction between threading and garbage collection in the GCRuntime::triggerGC function in js/src/jsgc.cpp. A remote attacker could exploit this vulnerability by enticing the user to visit a specially crafted website to execute arbitrary code or cause a denial of service condition.

3. Buffer overflow vulnerability ( CVE-2014-1576 )
A buffer overflow vulnerability exists in Mozilla products due to improper bounds checking by the nsTransformedTextRun() function. A remote attacker could exploit this vulnerability via Cascading Style Sheets (CSS) token sequences execute arbitrary code on the target system.

4. Out of Bounds Memory Corruption Vulnerability ( CVE-2014-1577 )
A memory corruption vulnerability exists in the Web Audio subsystem in Mozilla products due to out-of-bounds read in mozilla::dom::OscillatorNodeEngine::ComputeCustom() in Web Audio subsystem. A remote attacker could exploit this vulnerability via an invalid custom waveform that triggers a calculation of a negative frequency value. Successful exploitation of this vulnerability leads to obtaining of sensitive information or cause a denial of service conditions.

5. Denial Of Service Vulnerability ( CVE-2014-1578 )
This vulnerability is caused due to improper handling of buffering operations during video playback in Mozilla Firefox and Thunderbird browsers. A remote attacker could exploit this vulnerability via WebM frames with invalid tile sizes. Successful exploitation of this vulnerability could allow a remote attacker to cause a denial of service on the affected system.

6. Information Disclosure Vulnerability ( CVE-2014-1580 )
This vulnerability exists in Mozilla Firefox due to improper initialization of memory for GIF images. A remote attacker could exploit this vulnerability via a crafted GIF image that triggers a sequence of rendering operations within a (canvas) element . Successful exploitation of this vulnerability leads to obtaining of sensitive information from process memory of the affected systems.

7. Use-After-Free vulnerability ( CVE-2014-1581 )
A vulnerability has been reported in DirectionalityUtils.cpp function in multiple Mozilla products due to improper handling of text during the interaction between directionality resolution and layout. A remote attacker could exploit this vulnerability to execute arbitrary code on the target system.

8. Same Origin Policy Security Bypass Vulnerability ( CVE-2014-1583 )
This vulnerability exists in the Alarm API in Mozilla Firefox and Firefox ESR due to improper restriction of toJSON calls. A remote attacker could exploit this vulnerability via crafted API calls to bypass the Same Origin Policy to obtain sensitive information from within the JSON data of an alarm.

9. Security Bypass Vulnerability ( CVE-2014-1585 )
This vulnerability exists in Mozilla Firefox, Firefox ESR and Thunderbird due to improper implementation of WebRTC video-sharing feature in dom/media/MediaManager.cpp. A remote attacker could exploit this vulnerability by maintaining a session which leads to obtaining sensitive information from the local camera once the user discontinues streaming.

10. Security Bypass Vulnerability ( CVE-2014-1586 )
This vulnerability exists in Mozilla products due to an improper implementation of WebRTC video-sharing feature in dom/media/MediaManager.cpp. A remote attacker could exploit this vulnerability by maintaining a session which leads to obtaining sensitive information from the local camera when the user temporarily navigates away.


Impact



Solution/ Workarounds


Apply appropriate fixed versions as mentioned in Mozilla Security Advisory
https://www.mozilla.org/security/announce/2014/mfsa2014-74.html
https://www.mozilla.org/security/announce/2014/mfsa2014-75.html
https://www.mozilla.org/security/announce/2014/mfsa2014-76.html
https://www.mozilla.org/security/announce/2014/mfsa2014-77.html
https://www.mozilla.org/security/announce/2014/mfsa2014-78.html
https://www.mozilla.org/security/announce/2014/mfsa2014-80.html
https://www.mozilla.org/security/announce/2014/mfsa2014-81.html
https://www.mozilla.org/security/announce/2014/mfsa2014-82.html


References


http://www.cert-in.org.in/


Disclaimer


The information provided herein is on "as is" basis, without warranty of any kind.


 
     

© Copyright Sri Lanka CERT|CC. All Rights Reserved.