Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution
MS-ISAC ADVISORY NUMBER:2015-116
Multiple vulnerabilities have been identified in Mozilla Firefox, which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Firefox ESR is a version of the web browser intended to be deployed in large organizations. Firefox OS is the mobile operating system developed by Mozilla. Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.
There are currently no reports of these vulnerabilities being exploited in the wild.
- Mozilla Firefox versions prior to 41
- Firefox ESR versions prior to 38.3
- Firefox OS versions prior to 2.5
- Large and medium government entities: HIGH
- Small government entities: HIGH
- Large and medium business entities: HIGH
- Small business entities: HIGH
Two unspecified memory corruption vulnerabilities exist that could lead to arbitrary code execution (CVE-2015-4500, CVE-2015-4501)
One vulnerability that could lead to exposure of memory or private data to malicious servers (CVE-2015-4503)
One out of bounds read vulnerability in QCMS color management library which could lead to information disclosure (CVE-2015-4504)
One vulnerability which could potentially lead to site attribute spoofing by pasting a URL with an unknown scheme ( CVE-2015-4476)
One vulnerability which could lead to arbitrary file manipulation by local user through the Mozilla updater (CVE-2015-4505)
One vulnerability in libvpx while parsing vp9 format video which could lead to buffer overflow (CVE-2015-4506)
One vulnerability in reader mode which could lead to spoof the URL displayed in the addressed bar (CVE-2015-4508)
One use-after-free vulnerability exists when using a shared worker with indexDB which could lead to a potentially exploitable crash (CVE-2015-4510)
One buffer overflow vulnerability exists while decoding WebM videos which could lead to a potentially exploitable crash
One use-after-free vulnerability exists while manipulating HTML media content which could lead to a potentially exploitable crash (CVE-2015-4509)
One out of bounds read vulnerability exists while utilizing 2D canvas display on Linux 16-bit color depth systems (CVE-2015-4512)
One vulnerability exists in the way data is passed to a scripted proxy which violates the specifications set in place (CVE-2015-4502)
One vulnerability exists in Gecko’s implementation of ECMAScript 5 API which could lead to arbitrary code execution (CVE-2015-4516)
One vulnerability exists in the way dragged and dropped images are handled which could lead to information leakage (CVE-2015-4519)
One vulnerability exists in the way Cross-origin resource sharing(CORS) preflight request headers are handled which could lead to CORS security checks being bypassed (CVE-2015-4520)
Multiple vulnerabilities were discovered through the use of code inspector which could lead to memory safety issues or bypassing of overflow checks (CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180)
Two vulnerabilities in the libGLES portion of the ANGEL graphics library which could lead to potentially exploitable crashes (CVE-2015-7178, CVE-2015-7179)
One vulnerability in the High Resolution Time API that could lead to information disclosure.
We recommend the following actions be taken:
Apply appropriate updates provided by Mozilla to vulnerable systems, immediately after appropriate testing.
Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from un-trusted sources.