Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2018.0227 Multiple vulnerabilities have been identified in Firefox and Firefox ESR 3 October 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Mozilla Firefox Mozilla Firefox ESR Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2018-12387 CVE-2018-12386 Member content until: Friday, November 2 2018 OVERVIEW Multiple vulnerabilities have been identified in Firefox 62.0.2 and Firefox ESR 60.2.1. [1] IMPACT The vendor has provided the following details regarding the vulnerabilities: "#CVE-2018-12386: Type confusion in JavaScript Reporter Niklas Baumstark, Samuel Gross, Bruno Keith via Beyond Security's SecuriTeam Secure Disclosure program Impact critical Description A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. References o Bug 1493900 #CVE-2018-12387: Reporter Bruno Keith, Niklas Baumstark via Beyond Security's SecuriTeam Secure Disclosure program Impact critical Description A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. References o Bug 1493903" [1] MITIGATION The vendor recommends upgrading to the latest version of Mozilla Firefox to address these issues. [1] REFERENCES [1] Mozilla Foundation Security Advisory 2018-24 https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/ AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW7QyFGaOgq3Tt24GAQiR9xAA16LYklh83tPuF2QakDMP2VVoxdvRpwoL k9DYzvn+GYEMEJbbo3bvvAkOkX+iXpOQ9zuc8IAirMUl/qLjqrmp8dHmcizbwoUp OtpDF3jmpIza1t2eDGPvDurLwDK+80PvSlnvL2cwcc56XEadDrDDXhyHcOCpi3kY +kd6iSRYPol38+ByrGhBH7Wl9+t9mNL8xAciBbOkJL+ckzCcD/QO2fuOUSYZkGNh yaD2YCccLs3ifcxZI8hWsjXb0domRg3P24CvXIAxvLTYtCD5XD5MhX4D3BuMx3B2 NpjxMt3SIveULfZNZNU0sAl5UmQPkru2oq5m/0L2jDqdNw8ArJx+F1wpmiOLqGcl c2UjLbHhyyYFS0aUaijNCZg+uveOYzf1Kg5e1a6KO2BmeNNEmjExUeMXTIHV1gWU LgMhfuP91nxcMw/34T34kHh3oCLVex3cDVrwD6XBEi+fxYHUyQ2d43FkgbmlCOX3 4Szor5rv763fKxaB9sPS0wfMcKoLu1DgQ4xs8X7ExsGtLIzyBn4i7H0bojNQ2EOm MdeTqFdI2JU/c6VHBAgtvUnMLyW9sPvrWnyUfj6SadEQ4Ky8pPsHsONeFupgckMD dHVmS1NWoqVuuEA2UxAEQ5lzfQgSQ4mpwH1DVFKpNTrcrd06XiR517PP0/79atne cxkUazuKI34= =K2jN -----END PGP SIGNATURE-----