Malware Devil

Wednesday, September 23, 2020

ESB-2020.3246 – [Win][Linux][Mac] Firefox ESR: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3246
      MFSA 2020-43 Security Vulnerabilities fixed in Firefox ESR 78.3
                             23 September 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Firefox ESR
Publisher:         Mozilla
Operating System:  Windows
                   Linux variants
                   Mac OS
Impact/Access:     Cross-site Scripting           -- Remote with User Interaction
                   Denial of Service              -- Remote with User Interaction
                   Provide Misleading Information -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-15678 CVE-2020-15677 CVE-2020-15676
                   CVE-2020-15673  

Reference:         ESB-2020.3245

Original Bulletin: 
   https://www.mozilla.org/en-US/security/advisories/mfsa2020-43/

- --------------------------BEGIN INCLUDED TEXT--------------------

Mozilla Foundation Security Advisory 2020-43

Security Vulnerabilities fixed in Firefox ESR 78.3

Announced
    September 22, 2020
Impact
    moderate
Products
    Firefox ESR
Fixed in
       Firefox ESR 78.3

# CVE-2020-15677: Download origin spoofing via redirect

Reporter
    Richard Thomas and Tom Chothia of University of Birmingham
Impact
    moderate

Description

By exploiting an Open Redirect vulnerability on a website, an attacker could
have spoofed the site displayed in the download file dialog to show the
original site (the one suffering from the open redirect) rather than the site
the file was actually downloaded from.

References

  o Bug 1641487

# CVE-2020-15676: XSS when pasting attacker-controlled data into a
contenteditable element

Reporter
    Daniel Frojdendahl
Impact
    moderate

Description

Firefox sometimes ran the onload handler for SVG elements that the DOM
sanitizer decided to remove, resulting in JavaScript being executed after
pasting attacker-controlled data into a contenteditable element.

References

  o Bug 1646140

# CVE-2020-15678: When recursing through layers while scrolling, an iterator
may have become invalid, resulting in a potential use-after-free scenario

Reporter
    Lukas Bernhard
Impact
    moderate

Description

When recursing through graphical layers while scrolling, an iterator may have
become invalid, resulting in a potential use-after-free. This occurs because
the function APZCTreeManager::ComputeClippedCompositionBounds did not follow
iterator invalidation rules.

References

  o Bug 1660211

# CVE-2020-15673: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3

Reporter
    Jason Kratzer
Impact
    high

Description

Mozilla developer Jason Kratzer reported memory safety bugs present in Firefox
80 and Firefox ESR 78.2. Some of these bugs showed evidence of memory
corruption and we presume that with enough effort some of these could have been
exploited to run arbitrary code.

References

  o Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBX2qz3uNLKJtyKPYoAQgdXA//WvTaKeZyWoY1zEJdkoohMuAe3+7DDa8O
T7yzvh0hJVKST19Ts67/kgubN5eWd7tdwgw8BYq9kC0M1rnK4s/3mJeRFrjzYM6Y
VPgt+ANh/eGYF2drHUtkC1af3TzvWsiOWvkHQpkXUPVexgqbkGS5yGJgYJ8ifnd8
9gqpRqa3OQXMrOyQQP0acp4bCtDlhMcCQ1fqv5MF1B6gKn9aMHN+KE+w318R5d2J
ajw/1KDxRURwYOSlLWwWXIGVhi6p6YsPpeTc4m+icoKhr6URtrQorg57BxxC+J3A
y4HPnZbsNF0Xbh0Pz98rExMepodD4JUAcTGQlL30j3ecmuGZdwWbM9WIoqJqLXoC
Fw/9/elWx8G8NJAHwTeKqHUCj7wfGWwAwKfwt4DdRGeGr3/AC5PPjo0H8v0xQj22
ocJwbdq+3pAz/YuC4EBadR+wsYkK9LvIBeuxbsiEbN98BG+x85mzoReTuXEOGSRO
+PtfKQIynzGpQNhvkXBBlqFHYkqbYihrR0ihojlzf2eRJBEpVn8hViDFB7OPK6xf
zlfsBSOT9rauCF8qpmODrN+fjAoahK28IeJoRPpG30oAII4QoeuiR+qHMdy/vM7Y
JsYFNVQjjainv55akgzMYM40mV+EyTepL6z4rMhKEw1xBWAj9S5Yz7WCikB/UAsz
CgEY3+QH4rY=
=R4uO
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3246 – [Win][Linux][Mac] Firefox ESR: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2020/09/23/esb-2020-3246-winlinuxmac-firefox-esr-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3246-winlinuxmac-firefox-esr-multiple-vulnerabilities

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...