TITLE: Mozilla Firefox Multiple Vulnerabilities Criticality level: Highly critical Impact: Cross Site Scripting, System access, Spoofing, Exposure of sensitive information, Security Bypass Where: From remote SECUNIA ADVISORY ID: SA50088 DESCRIPTION: Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting and phishing attacks, and compromise a user's system. 1) Several unspecified errors in the browser engine can be exploited to corrupt memory. 2) A use-after-free error in nsHTMLEditor::CollapseAdjacentTextNodes can be exploited to dereference already freed memory. 3) A use-after-free error in nsObjectLoadingContent::LoadObject can be exploited to dereference already freed memory. 4) A use-after-free error in gfxTextRun::CanBreakLineBefore can be exploited to dereference already freed memory. 5) A use-after-free error in PresShell::CompleteMove can be exploited to dereference already freed memory. 6) A use-after-free error in nsHTMLSelectElement::SubmitNamesValues can be exploited to dereference already freed memory. 7) A use-after-free error in MediaStreamGraphThreadRunnable::Run() can be exploited to dereference already freed memory. 8) An unspecified error in nsBlockFrame::MarkLineDirty can be exploited to cause a heap-based buffer overflow. 9) An use-after-free error in nsHTMLEditRules::DeleteNonTableElements can be exploited to dereference already freed memory. 10) A use-after-free error in nsRangeUpdater::SelAdjDeleteNode can be exploited to dereference already freed memory. 11) A use-after-free error in mozSpellChecker::SetCurrentDictionary can be exploited to dereference already freed memory. 12) A use-after-free error in RangeData::~RangeData can be exploited to dereference already freed memory. 13) A bad iterator in text runs can be exploited to corrupt memory. 14) A use-after-free error in js::gc::MapAllocToTraceKind can be exploited to dereference already freed memory. 15) A use-after-free error in gfxTextRun::GetUserData can be exploited to dereference already freed memory. 16) An error allows shadowing the location object using Object.defineProperty, which can be exploited to confuse the current location to plugins and possibly conduct cross-site scripting attacks. 17) An error when a page opens a new tab allows opening a subsequent window that can be navigated to the chrome-privileged page "about:newtab". 18) An error when decoding a bitmap image with a negative "height" header value embedded in an icon file can be exploited to corrupt memory. 19) A use-after-free error when calling WebGL shaders after being destroyed can be exploited to dereference already freed memory. 20) An error in the Mesa drivers on Linux can be exploited to corrupt stack memory when using more than 16 sampler uniforms. 21) A signedness error in nsSVGFEMorphologyElement::Filter can be exploited to cause a heap-based buffer overflow. 22) A use-after-free error in nsTArray_base::Length can be exploited to dereference already freed memory when an element with a "requiredFeatures" attribute is moved between documents. 23) Two errors in graphite2::Silf::readClassMap and graphite2::Pass::readPass within the Graphite 2 library can be exploited to corrupt memory. 24) An error in the DOMParser when used to parse text/html data in a Firefox extension causes linked resources to be loaded, which may leak information. 25) An error may cause SSL certificate information for a previous site to be displayed on the addressbar after another site has been loaded by firing two "onLocationChange" events in unexpected order. 26) An error can be exploited to bypass checks for nsLocation::CheckURL and load restricted content. 27) In certain places, __android_log_print is called insecurely when a web page uses a "dump()" statement with a specially crafted string. 28) An error in the web console can be exploited to inject arbitrary code that will be executed with chrome privileges. SOLUTION: Upgrade to version 15. ORIGINAL ADVISORY: Mozilla: http://www.mozilla.org/security/announce/2012/mfsa2012-57.html http://www.mozilla.org/security/announce/2012/mfsa2012-58.html http://www.mozilla.org/security/announce/2012/mfsa2012-59.html http://www.mozilla.org/security/announce/2012/mfsa2012-60.html http://www.mozilla.org/security/announce/2012/mfsa2012-61.html http://www.mozilla.org/security/announce/2012/mfsa2012-62.html http://www.mozilla.org/security/announce/2012/mfsa2012-63.html http://www.mozilla.org/security/announce/2012/mfsa2012-64.html http://www.mozilla.org/security/announce/2012/mfsa2012-65.html http://www.mozilla.org/security/announce/2012/mfsa2012-66.html http://www.mozilla.org/security/announce/2012/mfsa2012-67.html http://www.mozilla.org/security/announce/2012/mfsa2012-68.html http://www.mozilla.org/security/announce/2012/mfsa2012-69.html http://www.mozilla.org/security/announce/2012/mfsa2012-70.html http://www.mozilla.org/security/announce/2012/mfsa2012-71.html http://www.mozilla.org/security/announce/2012/mfsa2012-72.html ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-