-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2015.0025
        A number of vulnerabilities have been identified in Mozilla
                    Firefox, Firefox ESR, and Seamonkey
                               23 March 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Mozilla Firefox
                      Mozilla Firefox ESR
                      Mozilla SeaMonkey
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2015-0818 CVE-2015-0817 
Member content until: Wednesday, April 22 2015

OVERVIEW

        A number of vulnerabilities have been identified in Mozilla Firefox,
        Firefox ESR, and Seamonkey prior to Firefox 36.0.3, Firefox ESR 31.5.2,
        and SeaMonkey 2.33.1. [1, 2]


IMPACT

        The vendor has provided the following details regarding these 
        issues:
        
        CVE-2015-0818: "Security researcher Mariusz Mlynski reported, 
        through HP Zero Day Initiative's Pwn2Own contest, a method to run 
        arbitrary scripts in a privileged context. This bypassed the 
        same-origin policy protections by using a flaw in the processing of
        SVG format content navigation." [1]
        
        CVE-2015-0817: "Security researcher ilxu1a reported, through HP Zero
        Day Initiative's Pwn2Own contest, a flaw in Mozilla's implementation
        of typed array bounds checking in JavaScript just-in-time 
        compilation (JIT) and its management of bounds checking for heap 
        access. This flaw can be leveraged into the reading and writing of 
        memory allowing for arbitary code execution on the local system." 
        [2]


MITIGATION

        The vendor recommends updating to the latest version of Firefox, 
        Firefox ESR, or SeaMonkey to correct these issues. [1, 2]


REFERENCES

        [1] Privilege escalation through SVG navigation
            https://www.mozilla.org/en-US/security/advisories/mfsa2015-28/

        [2] Code execution through incorrect JavaScript bounds checking
            elimination
            https://www.mozilla.org/en-US/security/advisories/mfsa2015-29/

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=hiwE
-----END PGP SIGNATURE-----