Home / mailingsPDF  

[USN-1681-3] Firefox regression

Posted on 22 January 2013
Ubuntu Security

==========================
==========================
========================
Ubuntu Security Notice USN-1681-3
January 22, 2013

firefox regression
==========================
==========================
========================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS

Summary:

USN-1681-1 introduced a regression in Firefox.

Software Description:
- firefox: Mozilla Open Source web browser

Details:

USN-1681-1 fixed vulnerabilities in Firefox. Due to an upstream regressio=
n,
some translations became unusable after upgrading. This update fixes the
problem.

We apologize for the inconvenience.

Original advisory details:

Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill
Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman=
,
and Julian Seward discovered multiple memory safety issues affecting
Firefox. If the user were tricked into opening a specially crafted page,=
an
attacker could possibly exploit these to cause a denial of service via
application crash, or potentially execute code with the privileges of th=
e
user invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)

Abhishek Arya discovered several user-after-free and buffer overflows in=

Firefox. An attacker could exploit these to cause a denial of service vi=
a
application crash, or potentially execute code with the privileges of th=
e
user invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,
CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-582=
9)

A stack buffer was discovered in Firefox. If the user were tricked into
opening a specially crafted page, an attacker could possibly exploit thi=
s
to cause a denial of service via application crash, or potentially execu=
te
code with the privileges of the user invoking Firefox. (CVE-2013-0768)

Masato Kinugawa discovered that Firefox did not always properly display =
URL
values in the address bar. A remote attacker could exploit this to condu=
ct
URL spoofing and phishing attacks. (CVE-2013-0759)

Atte Kettunen discovered that Firefox did not properly handle HTML table=
s
with a large number of columns and column groups. If the user were trick=
ed
into opening a specially crafted page, an attacker could exploit this to=

cause a denial of service via application crash, or potentially execute
code with the privileges of the user invoking Firefox. (CVE-2013-0744)

Jerry Baker discovered that Firefox did not always properly handle
threading when performing downloads over SSL connections. An attacker co=
uld
exploit this to cause a denial of service via application crash.
(CVE-2013-0764)

Olli Pettay and Boris Zbarsky discovered flaws in the Javacript engine o=
f
Firefox. An attacker could cause a denial of service via application cra=
sh,
or potentially execute code with the privileges of the user invoking
Firefox. (CVE-2013-0745, CVE-2013-0746)

Jesse Ruderman discovered a flaw in the way Firefox handled plugins. If=
a
user were tricked into opening a specially crafted page, a remote attack=
er
could exploit this to bypass security protections to conduct clickjackin=
g
attacks. (CVE-2013-0747)

Jesse Ruderman discovered an information leak in Firefox. An attacker co=
uld
exploit this to reveal memory address layout which could help in bypassi=
ng
ASLR protections. (CVE-2013-0748)

An integer overflow was discovered in the Javascript engine, leading to =
a
heap-based buffer overflow. If the user were tricked into opening a
specially crafted page, an attacker could possibly exploit this to execu=
te
code with the privileges of the user invoking Firefox. (CVE-2013-0750)

Sviatoslav Chagaev discovered that Firefox did not properly handle XBL
files with multiple XML bindings with SVG content. An attacker could cau=
se
a denial of service via application crash, or potentially execute code w=
ith
the privileges of the user invoking Firefox. (CVE-2013-0752)

Mariusz Mlynski discovered two flaws to gain access to privileged chrome=

functions. An attacker could possibly exploit this to execute code with =
the
privileges of the user invoking Firefox. (CVE-2013-0757, CVE-2013-0758)

Several use-after-free issues were discovered in Firefox. If the user we=
re
tricked into opening a specially crafted page, an attacker could possibl=
y
exploit this to execute code with the privileges of the user invoking
Firefox. (CVE-2013-0753, CVE-2013-0754, CVE-2013-0755, CVE-2013-0756)

Two intermediate CA certificates were mis-issued by the TURKTRUST
certificate authority. If a remote attacker were able to perform a
man-in-the-middle attack, this flaw could be exploited to view sensitive=

information. (CVE-2013-0743)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
firefox 18.0.1+build1-0ubuntu0.12.10.1

Ubuntu 12.04 LTS:
firefox 18.0.1+build1-0ubuntu0.12.04.1

Ubuntu 11.10:
firefox 18.0.1+build1-0ubuntu0.11.10.1

Ubuntu 10.04 LTS:
firefox 18.0.1+build1-0ubuntu0.10.04.1

After a standard system update you need to restart Firefox to make all th=
e
necessary changes.

References:
http://www.ubuntu.com/usn/usn-1681-3
http://www.ubuntu.com/usn/usn-1681-1
https://launchpad.net/bugs/1098312

Package Information:

https://launchpad.net/ubuntu/+source/firefox/18.0.1+build1-0ubuntu0.12.10=
=2E1

https://launchpad.net/ubuntu/+source/firefox/18.0.1+build1-0ubuntu0.12.04=
=2E1

https://launchpad.net/ubuntu/+source/firefox/18.0.1+build1-0ubuntu0.11.10=
=2E1

https://launchpad.net/ubuntu/+source/firefox/18.0.1+build1-0ubuntu0.10.04=
=2E1





------------

 

TOP