ESB-2018.2985 - [Ubuntu] firefox: Multiple vulnerabilities 2018-10-04

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2985
                          Firefox vulnerabilities
                              4 October 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           firefox
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-12387 CVE-2018-12386 CVE-2018-12385

Reference:         ASB-2018.0227
                   ASB-2018.0224
                   ESB-2018.2921
                   ESB-2018.2843

Original Bulletin: 
   http://www.ubuntu.com/usn/usn-3778-1

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-3778-1: Firefox vulnerabilities

3 October 2018

firefox vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  o Ubuntu 18.04 LTS
  o Ubuntu 16.04 LTS
  o Ubuntu 14.04 LTS

Summary

Firefox could be made to crash or run programs as your login if it opened a
malicious website.

Software Description

  o firefox - Mozilla Open Source web browser

Details

A crash was discovered in TransportSecurityInfo used for SSL, which could be
triggered by data stored in the local cache directory. An attacker could
potentially exploit this in combination with another vulnerability that allowed
them to write data to the cache, to execute arbitrary code. (CVE-2018-12385)

A type confusion bug was discovered in JavaScript. If a user were tricked in to
opening a specially crafted website, an attacker could exploit this to cause a
denial of service, or execute arbitrary code. (CVE-2018-12386)

It was discovered that the Array.prototype.push could leak memory addresses to
the calling function in some circumstances. An attacker could exploit this in
combination with another vulnerability to help execute arbitrary code.
(CVE-2018-12387)

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 18.04 LTS
    firefox - 62.0.3+build1-0ubuntu0.18.04.1
Ubuntu 16.04 LTS
    firefox - 62.0.3+build1-0ubuntu0.16.04.2
Ubuntu 14.04 LTS
    firefox - 62.0.3+build1-0ubuntu0.14.04.2

To update your system, please follow these instructions: https://
wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make all the
necessary changes.

References

  o CVE-2018-12385
  o CVE-2018-12386
  o CVE-2018-12387

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW7VxOmaOgq3Tt24GAQhxFw//eS4n7kylBUKsablR0kb/FT1l0gL+n6cY
rbpmlOAQQQbl/RBCeD0y89z4Zs95sIzeVXpK4fMHR4sA0AtdRa1ZcT5AlrsrQkvn
WE1N1RdBCV3/Uf1UgGlAo7sAbTInS1K3mbiTLf7IoC4hMFdWubyVOF6edFmeYEKa
6OkAoCai6whbtFB/YePuPOE/eGC6NFBoYAViX7043Wr/2nZDwoe6kDZz/A1Gmwbc
LaR3gpAwitn1xEGT10fHUGRYwvHuJKvUewTA6q9wAcfjJpTdtPTaqg7v2GZNyLkC
2q0Fg3c1TxCHMlCg6Nh8w8Jk7r3ldObkjpYlesVh9z7WFPoNjn9wcvbzWtsd7c3V
yKQ062OE86pKPYIMOcOCefwF1UqN/LNlT8anKgdHzwzgUKgYYgfI9++m04SAcde/
wNWfeWyHGOVn3B7VPFHIuVX8J4w17+54jQNbK7DmNcKLv25MkNF/xyPGXpp6+3ui
0GVDr1NbHOJy/BvOOFQbWJVwW2KjnGMgB5149A3trMCMbCqttIiZHCdQja1yK3cj
RduEeOPW4viymuUrxbCWJ6m7ZZ2IORIrAW5e7fexqIbnHhl0DkndrYp37XR3h7u8
C30rdO6C0jfyqtvufGB/s4/4U15iHd4D+8v8jDEaYpEWQCihLqsvnc1AqUm3PVqV
OFbgTwUlSEk=
=XftU
-----END PGP SIGNATURE-----

« Back to bulletins