-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2015.0030
        Mozilla Firefox version 37.0.1 has been released to correct
                         multiple vulnerabilities.
                               8 April 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Mozilla Firefox
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
                      Android
Impact/Access:        Access Privileged Data         -- Remote with User Interaction
                      Provide Misleading Information -- Remote with User Interaction
                      Reduced Security               -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2015-0799 CVE-2015-0798 
Member content until: Friday, May  8 2015

OVERVIEW

        Mozilla Firefox version 37.0.1 has been released to correct multiple
        vulnerabilities. [1 - 3]


IMPACT

        The vendor has provided the following details regarding these 
        issues:
        
        CVE-2015-0798: "Security researcher Armin Razmdjou reported a flaw 
        in Reader mode on Firefox for Android. Reader mode reformats web 
        content for easy readability and operates as unprivileged content 
        that is the equivalent of the formatted content. When Reader mode is
        unable to process content, it displays the original web pages. Since
        it is unprivileged, there are no restrictions on pages linking to or
        framing Reader mode content. The reported flaw is that privileged 
        URLs can be passed to Reader mode and bypass the normal restrictions
        that prevent web pages from obtaining references to privileged 
        contexts. If this issue was combined with another flaw that allowed
        for a violation of the same-origin policy, then the resulting 
        combination could lead to arbitrary code execution.
        
        This flaw only affects Firefox for Android and pre-release versions
        of Desktop Firefox. The released version of desktop Firefox does not
        have reader mode and is not affected." [2]
        
        CVE-2015-0799:"Security researcher Muneaki Nishimura discovered a 
        flaw in the Mozilla's HTTP Alternative Services implementation. If 
        an Alt-Svc header is specified in the HTTP/2 response, SSL 
        certificate verification can be bypassed for the specified alternate
        server. As a result of this, warnings of invalid SSL certificates 
        will not be displayed and an attacker could potentially impersonate
        another site through a man-in-the-middle (MTIM), replacing the 
        original certificate with their own." [3]


MITIGATION

        The vendor recommends updating to the latest versions of Mozilla 
        Firefox. [1 - 3]


REFERENCES

        [1] Mozilla Foundation Security Advisories
            https://www.mozilla.org/en-US/security/advisories/

        [2] Loading privileged content through Reader mode
            https://www.mozilla.org/en-US/security/advisories/mfsa2015-43/

        [3] Certificate verification bypass through the HTTP/2 Alt-Svc header
            https://www.mozilla.org/en-US/security/advisories/mfsa2015-44/

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVSSphRLndAQH1ShLAQJtnw//ZFnCp3JCoBfYdmKbzUW1c+1YXTJLg0Ma
h+cTYM/mr0xrKh6b21Dj0w9XkUPw0/7SCn3e9q5uNGYed2R54SiJr2DMvuP8GQ0l
QPBxA8DijSGkAu1Y5DBLNjNRtg8CQS9bvn84GL7FrWtSlKz1SYE1ieQeTEBAcV+p
KfDNDFqn7X77sTAUUD4547twFJ+Wz/ZAlb0SZOI4R/v4iGQW5WyqDxNeD5bxKthH
plIy5mUBgUxrD5A13sA0vhhTipnk0DmkzIlinqNL/GR7zi+9B9RuYaeLERQuQF+v
KrXk+XgmP5js8ECBIfp0xW3Ph1fmNufgqxIdFUKqBivMBzugAYmcypFKF+8TS2Ob
XW8nViVewPIY7ignQZt/xaYJ9bkUNeyN+S9pVUUJJCyR1uXC8MzW8H4/cRxUjknr
nKjSvkvurH838E9ABMchW91sFq0sMzBcU2umYLo9iJQB0CucCplhW4WV7oeb90n7
uxJBD2KBWI8uelfli8PL8icbYpQyLaGZc7seSng2+Ea42UpFju+g2BO7+Qv+eC4o
sdtEg7xa7OtG/mqsNX6ExmXuome2UPLNq2YosFGzq4WWUhUgbic1bkwMefj9ze1k
tZ6nnortcxHWMNG1REhdhTu7sZzRp2kNngMU6AAUvztkY+wYZzO7ML5fO+kRnx8y
jzVqJWCayBQ=
=3E3N
-----END PGP SIGNATURE-----