Description: | Summary: Mozilla Firefox is prone to multiple vulnerabilities.
Vulnerability Insight: Multiple flaws exist due to:
- Use-after-free using destroyed node when regenerating trees.
- Use-after-free during docshell reloading.
- Use-after-free with track elements.
- Use-after-free with content viewer listeners.
- Use-after-free with IME input.
- Out-of-bounds read in WebGL with ImageInfo object.
- Privilege escalation through Firefox Installer with same directory DLL files.
- Use-after-free and use-after-scope logging XHR header errors.
- Use-after-free in IndexedDB.
- Vulnerabilities in the Graphite 2 library.
- Out-of-bounds read in Opus encoder.
- Android intent URLs can cause navigation to local file system.
- File manipulation and privilege escalation via callback parameter in Mozilla Windows Updater and Maintenance Service.
- File deletion and privilege escalation through Mozilla Maintenance Service helper.exe application.
- Addressbar spoofing in Reader mode.
- Mac fonts render some unicode characters as spaces.
- Domain spoofing with combination of Canadian Syllabics and other unicode blocks.
- Mark of the Web bypass when saving executable files.
- File execution and privilege escalation through updater.ini, Mozilla Windows Updater, and Mozilla Maintenance Service.
- Privilege escalation and arbitrary file overwrites through Mozilla Windows Updater and Mozilla Maintenance Service.
- 32 byte arbitrary file read through Mozilla Maintenance Service.
- Addressbar spoofing with JavaScript events and fullscreen mode.
Vulnerability Impact: Successful exploitation will allow remote attackers to execute arbitrary code, to delete arbitrary files by leveraging certain local file execution, to obtain sensitive information, and to cause a denial of service.
Affected Software/OS: Mozilla Firefox versions before 54.0.
Solution: Update to version 54.0 or later.
CVSS Score: 7.5
CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
|