-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2018.0227
 Multiple vulnerabilities have been identified in Firefox and Firefox ESR
                              3 October 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Mozilla Firefox
                      Mozilla Firefox ESR
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Denial of Service               -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2018-12387 CVE-2018-12386 
Member content until: Friday, November  2 2018

OVERVIEW

        Multiple vulnerabilities have been identified in Firefox 62.0.2 and
        Firefox ESR 60.2.1. [1]


IMPACT

        The vendor has provided the following details regarding the 
        vulnerabilities:
        
        "#CVE-2018-12386: Type confusion in JavaScript
        
        Reporter
            Niklas Baumstark, Samuel Gross, Bruno Keith via Beyond Security's SecuriTeam
            Secure Disclosure program
        Impact
            critical
        
        Description
        
        A vulnerability in register allocation in JavaScript can lead to type
        confusion, allowing for an arbitrary read and write. This leads to remote code
        execution inside the sandboxed content process when triggered.
        
        References
        
          o Bug 1493900
        
        #CVE-2018-12387:
        
        Reporter
            Bruno Keith, Niklas Baumstark via Beyond Security's SecuriTeam Secure
            Disclosure program
        Impact
            critical
        
        Description
        
        A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push
        with multiple arguments that results in the stack pointer being off by 8 bytes
        after a bailout. This leaks a memory address to the calling function which can
        be used as part of an exploit inside the sandboxed content process.
        
        References
        
          o Bug 1493903" [1]


MITIGATION

        The vendor recommends upgrading to the latest version of Mozilla 
        Firefox to address these issues. [1]


REFERENCES

        [1] Mozilla Foundation Security Advisory 2018-24
            https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW7QyFGaOgq3Tt24GAQiR9xAA16LYklh83tPuF2QakDMP2VVoxdvRpwoL
k9DYzvn+GYEMEJbbo3bvvAkOkX+iXpOQ9zuc8IAirMUl/qLjqrmp8dHmcizbwoUp
OtpDF3jmpIza1t2eDGPvDurLwDK+80PvSlnvL2cwcc56XEadDrDDXhyHcOCpi3kY
+kd6iSRYPol38+ByrGhBH7Wl9+t9mNL8xAciBbOkJL+ckzCcD/QO2fuOUSYZkGNh
yaD2YCccLs3ifcxZI8hWsjXb0domRg3P24CvXIAxvLTYtCD5XD5MhX4D3BuMx3B2
NpjxMt3SIveULfZNZNU0sAl5UmQPkru2oq5m/0L2jDqdNw8ArJx+F1wpmiOLqGcl
c2UjLbHhyyYFS0aUaijNCZg+uveOYzf1Kg5e1a6KO2BmeNNEmjExUeMXTIHV1gWU
LgMhfuP91nxcMw/34T34kHh3oCLVex3cDVrwD6XBEi+fxYHUyQ2d43FkgbmlCOX3
4Szor5rv763fKxaB9sPS0wfMcKoLu1DgQ4xs8X7ExsGtLIzyBn4i7H0bojNQ2EOm
MdeTqFdI2JU/c6VHBAgtvUnMLyW9sPvrWnyUfj6SadEQ4Ky8pPsHsONeFupgckMD
dHVmS1NWoqVuuEA2UxAEQ5lzfQgSQ4mpwH1DVFKpNTrcrd06XiR517PP0/79atne
cxkUazuKI34=
=K2jN
-----END PGP SIGNATURE-----