Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2016.0012 A number of vulnerabilities have been identified in Mozilla Firefox 15 February 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Mozilla Firefox Mozilla Firefox ESR Operating System: Android Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2016-1949 CVE-2016-1523 Member content until: Wednesday, March 16 2016 OVERVIEW A number of vulnerabilities have been identified in Mozilla Firefox ESR prior to 38.6.1 and Firefox 44.0.2. [1-2] IMPACT The vendor has provided the following information: CVE-2016-1949: "Jason Pang of OneSignal reported that service workers intercept responses to plugin network requests made through the browser. Plugins which make security decisions based on the content of network requests can have these decisions subverted if a service worker forges responses to those requests. For example, a forged crossdomain.xml could allow a malicious site to violate the same-origin policy using the Flash plugin." [1] CVE-2016-1523: "Security researcher Holger Fuhrmannek reported that a malicious Graphite "smart font" could circumvent the validation of internal instruction parameters in the Graphite 2 library using special CNTXT_ITEM instructions. This could result in arbitrary code execution. This issue affected Graphite 2 version 1.2.4, which was used in the Firefox ESR branch. To address this issue and other security vulnerabilities recently disclosed by Cisco Talos affecting this version of the library, Firefox ESR has been updated to version 1.3.5, the same one used in Firefox 44." [2] MITIGATION The vendor recommends updating to the latest version. [1-2] REFERENCES [1] Mozilla Foundation Security Advisory 2016-13 https://www.mozilla.org/en-US/security/advisories/mfsa2016-13/ [2] Mozilla Foundation Security Advisory 2016-14 https://www.mozilla.org/en-US/security/advisories/mfsa2016-14/ AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVsEqVH6ZAP0PgtI9AQLRCBAA0sp/fquuk5nMSL1SvSk8Mt5HKABzrHxW 4ylBbWvLkIWOOnJuFyeTCYFdy950/jJv+fIc4hPEaYeAX65VteoOEsaXsPPubV6n vH/gIaOrN4aHVvZsGAUOAO43FPJ6RmAz3IXbcZ08WR+RYYto64KNrjsXw/ktOgFb ftzVhpF2X+zlYpiV7xHAxMFOMuQgnBP9bR8XgcfQV+/Bo52uGGnTkik9bemfmzT/ ZW15xRIIB0oi/3sJacNFEjrzQuZ6FpuN1NbEyzqsHi4+DpN6doFeybxrfDAAoQLI GJ+vYWLrKpnmCppIOT77lw9TLnxLW47EbKbscqEgH+ZIaXTJOXaYyOhlc0/X9O3u W95WVh8RKgBd76UMmbL9Z1yQAb+Cpk+vrn4bocy3Wmr/09D2c7Qd2e/nufaGxVKl FXyj2KLAxcXzjSJCOqMj4dHuV4rqbGJS4yTLarwiVOlFz2rhSuK/3QWZeIejaMd2 Af+OxAZ2EvTmmssRgXh7jLUuMQL1A09Q+ojWbpjCJpzhKNWYqKBQ2uoiWcj0RmHm Wd40bP4CDrumFJgiJNTo4J2dHk9EbaPIehHXBmc876W+3PFijeI9+9X/g3/rO/Kk 4GRkUjvbLUzay+3WL3MhsDm6QTRd4r/AtIWZA1zkwrI3HkkwiDWXpycjjLdFFP2q 9GpURAEYCQo= =xTnw -----END PGP SIGNATURE-----