Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2015.0025 A number of vulnerabilities have been identified in Mozilla Firefox, Firefox ESR, and Seamonkey 23 March 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Mozilla Firefox Mozilla Firefox ESR Mozilla SeaMonkey Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2015-0818 CVE-2015-0817 Member content until: Wednesday, April 22 2015 OVERVIEW A number of vulnerabilities have been identified in Mozilla Firefox, Firefox ESR, and Seamonkey prior to Firefox 36.0.3, Firefox ESR 31.5.2, and SeaMonkey 2.33.1. [1, 2] IMPACT The vendor has provided the following details regarding these issues: CVE-2015-0818: "Security researcher Mariusz Mlynski reported, through HP Zero Day Initiative's Pwn2Own contest, a method to run arbitrary scripts in a privileged context. This bypassed the same-origin policy protections by using a flaw in the processing of SVG format content navigation." [1] CVE-2015-0817: "Security researcher ilxu1a reported, through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's implementation of typed array bounds checking in JavaScript just-in-time compilation (JIT) and its management of bounds checking for heap access. This flaw can be leveraged into the reading and writing of memory allowing for arbitary code execution on the local system." [2] MITIGATION The vendor recommends updating to the latest version of Firefox, Firefox ESR, or SeaMonkey to correct these issues. [1, 2] REFERENCES [1] Privilege escalation through SVG navigation https://www.mozilla.org/en-US/security/advisories/mfsa2015-28/ [2] Code execution through incorrect JavaScript bounds checking elimination https://www.mozilla.org/en-US/security/advisories/mfsa2015-29/ AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVQ96YBLndAQH1ShLAQJ1rA/9E3Df2vJP6dUbq+XKo5eSIHu3mirk1k+/ v/wzyYgSRgtsW5kmQXJaV3sYUVwvrI/q868ZXfHxWFSuPP4mIHF+eVaDWDt2Sijf fF3bxDM2c6uc76fYwrTb4OVuprnCQGFKhMxsV6aiea+WTusbk/TKu4J4YsufQEy6 RY5UydG+U7/Zg1F83+mxojClQWNdJ8EadI40O3PaqRmmZW/Deak4mkvepDMnZbx4 3biU80Wbq1zytpMEYgX215t2WelynuHWrLk5j6bdDfXgiPM5TpU0QFn7z7xChmQv G8wj4iqGoct7Oz5bWGnj867Uk0UhkneYzPo219fe6Aft4BUqo4/aIAHke/+YGMxI IQkttQgciE40l2R5OTomlYXPeBbIsclypG8pE2tCNaDmpwkmwUCrzkSh+XCyU+71 5oc/BWFJ1d15hRMGq+BJdtceXCo43DpUeJKiwk1Ayfyb4GQ6Jgf+4rDuAmL5dFMn EKPjq0/HOWCx1Ro5YMuRN/zbOJnSO0bfnSn/10IsDP9BUfvtWJ3VtIl2eMAp+/Qj M6UYCEYTGM9Ne6/g2a8sDqZfhv/bcbn3LaIIYNxhM3Axdtk5v7VfGOHZAeSsNRo0 B7/UC/DDakxZWAYUZ7FuNk8dUF8EnZmFDq2IITuoNjGVTgSpiIXJSaG6C2NNXa6t x7rHMvVzo3k= =hiwE -----END PGP SIGNATURE-----