Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ USN-3044-1: Firefox vulnerabilities

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š USN-3044-1: Firefox vulnerabilities


๐Ÿ’ก Newskategorie: Unix Server
๐Ÿ”— Quelle: ubuntu.com

Ubuntu Security Notice USN-3044-1

5th August, 2016

firefox vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Firefox could be made to crash or run programs as your login if it opened a malicious website.

Software description

  • firefox - Mozilla Open Source web browser

Details

Gustavo Grieco discovered an out-of-bounds read during XML parsing in
some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash, or obtain sensitive information.
(CVE-2016-0718)

Toni Huttunen discovered that once a favicon is requested from a site,
the remote server can keep the network connection open even after the page
is closed. A remote attacked could potentially exploit this to track
users, resulting in information disclosure. (CVE-2016-2830)

Christian Holler, Tyson Smith, Boris Zbarsky, Byron Campen, Julian Seward,
Carsten Book, Gary Kwong, Jesse Ruderman, Andrew McCreight, and Phil
Ringnalda discovered multiple memory safety issues in Firefox. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via application
crash, or execute arbitrary code. (CVE-2016-2835, CVE-2016-2836)

A buffer overflow was discovered in the ClearKey Content Decryption
Module (CDM) during video playback. If a user were tricked in to opening
a specially crafted website, an attacker could potentially exploit this to
cause a denial of service via plugin process crash, or, in combination
with another vulnerability to escape the GMP sandbox, execute arbitrary
code. (CVE-2016-2837)

Atte Kettunen discovered a buffer overflow when rendering SVG content in
some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash, or execute arbitrary code.
(CVE-2016-2838)

Bert Massop discovered a crash in Cairo with version 0.10 of FFmpeg. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to execute arbitrary code. (CVE-2016-2839)

Catalin Dumitru discovered that URLs of resources loaded after a
navigation start could be leaked to the following page via the Resource
Timing API. An attacker could potentially exploit this to obtain sensitive
information. (CVE-2016-5250)

Firas Salem discovered an issue with non-ASCII and emoji characters in
data: URLs. An attacker could potentially exploit this to spoof the
addressbar contents. (CVE-2016-5251)

Georg Koppen discovered a stack buffer underflow during 2D graphics
rendering in some circumstances. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
cause a denial of service via application crash, or execute arbitrary
code. (CVE-2016-5252)

Abhishek Arya discovered a use-after-free when the alt key is used with
top-level menus. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause a denial of
service via application crash, or execute arbitrary code. (CVE-2016-5254)

Jukka Jylänki discovered a crash during garbage collection. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit this to execute arbitrary code. (CVE-2016-5255)

Looben Yang discovered a use-after-free in WebRTC. If a user were tricked
in to opening a specially crafted website, an attacker could potentially
exploit this to cause a denial of service via application crash, or
execute arbitrary code. (CVE-2016-5258)

Looben Yang discovered a use-after-free when working with nested sync
events in service workers. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
cause a denial of service via application crash, or execute arbitrary
code. (CVE-2016-5259)

Mike Kaply discovered that plain-text passwords can be stored in session
restore if an input field type is changed from "password" to "text" during
a session, leading to information disclosure. (CVE-2016-5260)

Samuel Groß discovered an integer overflow in WebSockets during data
buffering in some circumstances. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
cause a denial of service via application crash, or execute arbitrary
code. (CVE-2016-5261)

Nikita Arykov discovered that JavaScript event handlers on a <marquee>
element can execute in a sandboxed iframe without the allow-scripts flag
set. If a user were tricked in to opening a specially crafted website, an
attacker could potentially exploit this to conduct cross-site scripting
(XSS) attacks. (CVE-2016-5262)

A type confusion bug was discovered in display transformation during
rendering. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause a denial of
service via application crash, or execute arbitrary code. (CVE-2016-5263)

A use-after-free was discovered when applying effects to SVG elements in
some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash, or execute arbitrary code.
(CVE-2016-5264)

Abdulrahman Alqabandi discovered a same-origin policy violation relating
to local HTML files and saved shortcut files. An attacker could
potentially exploit this to obtain sensitive information. (CVE-2016-5265)

Rafael Gieschke discovered an information disclosure issue related to
drag and drop. An attacker could potentially exploit this to obtain
sensitive information. (CVE-2016-5266)

A text injection issue was discovered with about: URLs. An attacker could
potentially exploit this to spoof internal error pages. (CVE-2016-5268)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 16.04 LTS:
firefox 48.0+build2-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 48.0+build2-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
firefox 48.0+build2-0ubuntu0.12.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make
all the necessary changes.

References

CVE-2016-0718, CVE-2016-2830, CVE-2016-2835, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-2839, CVE-2016-5250, CVE-2016-5251, CVE-2016-5252, CVE-2016-5254, CVE-2016-5255, CVE-2016-5258, CVE-2016-5259, CVE-2016-5260, CVE-2016-5261, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265, CVE-2016-5266, CVE-2016-5268

...













๐Ÿ“Œ CVE-2020-6798 | Mozilla Firefox/Firefox ESR/Thunderbird Template Tag cross site scripting (USN-4278-2)


๐Ÿ“ˆ 15.41 Punkte

๐Ÿ“Œ CVE-2020-6800 | Mozilla Firefox/Firefox ESR/Thunderbird memory corruption (USN-4278-2)


๐Ÿ“ˆ 15.41 Punkte

๐Ÿ“Œ USN-2833-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-3111-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-3140-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-2880-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-2917-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-3076-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-2936-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-3124-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-2833-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-2917-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-3076-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-3124-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-2993-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-3155-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-3175-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-3260-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-3544-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-4408-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-4546-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-4599-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-2880-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-4599-2: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-2936-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-4637-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-4637-2: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-2993-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-3111-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-3140-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-4717-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-4756-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-4978-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-3155-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

๐Ÿ“Œ USN-5475-1: Firefox vulnerabilities


๐Ÿ“ˆ 15.38 Punkte

matomo