-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2018.0058
            Security vulnerabilities fixed in Firefox ESR 52.7
                               14 March 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Firefox Extended Support Release
Operating System:     Windows
                      Linux variants
                      Mac OS
                      Android
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Increased Privileges            -- Remote with User Interaction
                      Denial of Service               -- Remote with User Interaction
                      Unauthorised Access             -- Existing Account            
Resolution:           Patch/Upgrade
CVE Names:            CVE-2018-5145 CVE-2018-5144 CVE-2018-5131
                      CVE-2018-5130 CVE-2018-5129 CVE-2018-5127
                      CVE-2018-5125  
Member content until: Friday, April 13 2018

OVERVIEW

        Security vulnerabilities have been fixed in Firefox ESR 52.7. [1]


IMPACT

        Mozilla have provided the following information:
        
        "
        CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
        A buffer overflow can occur when manipulating the SVG animatedPathSegList
        through script. This results in a potentially exploitable crash.
        
        CVE-2018-5129: Out-of-bounds write with malformed IPC messages
        A lack of parameter validation on IPC messages results in a potential
        out-of-bounds write through malformed IPC messages. This can potentially allow
        for sandbox escape through memory corruption in the parent process.
        
        CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
        When packets with a mismatched RTP payload type are sent in WebRTC connections,
        in some circumstances a potentially exploitable crash is triggered.
        
        CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache
        resources
        Under certain circumstances the fetch() API can return transient local copies
        of resources that were sent with a no-store or no-cache cache header instead of
        downloading a copy from the network as it should. This can result in previously
        stored, locally cached data of a website being accessible to users if they
        share a common profile while browsing.
        
        CVE-2018-5144: Integer overflow during Unicode conversion
        An integer overflow can occur during conversion of text to some Unicode
        character sets due to an unchecked length parameter.
        
        CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
        Mozilla developers and community members Bob Clary, Olli Pettay, Christian
        Holler, Nils Ohlmeier, Randell Jesup, Tyson Smith, Ralph Giles, and Philipp
        reported memory safety bugs present in Firefox 58 and Firefox ESR 52.6. Some of
        these bugs showed evidence of memory corruption and we presume that with enough
        effort that some of these could be exploited to run arbitrary code.
        
        CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7
        Mozilla developers Jet Villegas and Randell Jesup reported memory safety bugs
        present in Firefox ESR 52.6. These bugs showed evidence of memory corruption
        and we presume that with enough effort that some of these could be exploited to
        run arbitrary code.
        "


MITIGATION

        Mozilla recommends updating to Firefox ESR 52.7. [1]


REFERENCES

        [1] Security vulnerabilities fixed in Firefox ESR 52.7
            https://www.mozilla.org/en-US/security/advisories/mfsa2018-07/

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWqh914x+lLeg9Ub1AQj4ww//fHVR5Itoq/VmZXaHY2Xdn2m9CmTp48qz
EAWAuxeJFQdOvFVTkjc7BcnrGw4OzH3VKTfkVe+cyyftb56y2z2qT4dKfcRuixF6
ifylCug03t/ShDAA7Ca1dw/IcnBd8fp69gmRbTmxiP2M9YyeABBodh6OuQSunvus
IziUowo8EGQdKa081I1QDskpks/hzdJVTpqyYn0w40TJ3smks+oyFjT/Fol55djw
n0qTlWaWN39nGppNAoqZFviovaSNYrv0bkoOPLNXzkGBw2ncMBLQp9RnVRSPMWVE
Clz0wBV92unZrLez5GYFP1KDXW+/+oJV/YqxXCrBNrw6EwjKsqK605NbW/YiZHeq
pz629F09/Glz6RZcZeMainHXfIZMIPemDd/ccedmG9BwqT5ou6aX2KUx49TdhW9B
Aeg1eZELWsmEkqOe+MHYRQbgrkso7wmqNS506E4LW9PKhYgHGzsK4ZTsBFeC4CcU
ytSmUppjn+jjJ6b0APZaHwjKPh9FXg9czTm7yJ1kKR5bIJlMANTMoouWdJtsjKWR
ZySMmoEdly1JFVvCXIDq4nc1MsKOJZv/TOSvaakkDRUpVLbBzqK8Wc8eXXlV1fiM
2TqptBSS3xIHfTvPiTjvDaYr/ew56nJzHAQ+W1G2uiuwSC9aGO5YA5O65ZrwyRVR
8KKhmwaueGg=
=Fqkv
-----END PGP SIGNATURE-----