===================================================================== CERT-Renater Note d'Information No. 2013/VULN066 _____________________________________________________________________ DATE : 21/02/2013 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S) : Systems running Firefox versions prior to 19.0, ESR 17.0.3, Thunderbird versions prior to 17.0.3, ESR 17.0.3, SeaMonkey versions versions prior to 2.16. ====================================================================== http://www.mozilla.org/security/announce/2013/mfsa2013-21.html http://www.mozilla.org/security/announce/2013/mfsa2013-22.html http://www.mozilla.org/security/announce/2013/mfsa2013-23.html http://www.mozilla.org/security/announce/2013/mfsa2013-24.html http://www.mozilla.org/security/announce/2013/mfsa2013-25.html http://www.mozilla.org/security/announce/2013/mfsa2013-26.html http://www.mozilla.org/security/announce/2013/mfsa2013-27.html http://www.mozilla.org/security/announce/2013/mfsa2013-28.html ______________________________________________________________________ Mozilla Foundation Security Advisory 2013-21 Title: Miscellaneous memory safety hazards (rv:19.0 / rv:17.0.3) Impact: Critical Announced: February 19, 2013 Reporter: Mozilla Developers Products: Firefox, Thunderbird, SeaMonkey Fixed in: Firefox 19.0 Firefox ESR 17.0.3 Thunderbird 17.0.3 Thunderbird ESR 17.0.3 SeaMonkey 2.16 Description Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products. References Olli Pettay, Christoph Diehl, Gary Kwong, Jesse Ruderman, Andrew McCreight, Joe Drew, and Wayne Mery reported memory safety problems and crashes that affect Firefox ESR 17, and Firefox 18. Memory safety bugs fixed in Firefox ESR 17.0.3, and Firefox 19 (CVE-2013-0783) Alon Zakai, Christian Holler, Gary Kwong, Jesse Ruderman, Luke Wagner, Terrence Cole, Timothy Nikkel, Olli Pettay, Bill McCloskey, and Nicolas Pierron reported memory safety problems and crashes that affect Firefox 18. Memory safety bugs fixed in Firefox 19 (CVE-2013-0784) ______________________________________________________________________ Mozilla Foundation Security Advisory 2013-22 Title: Out-of-bounds read in image rendering Impact: Moderate Announced: February 19, 2013 Reporter: Atte Kettunen Products: Firefox, Thunderbird, SeaMonkey Fixed in: Firefox 19.0 SeaMonkey 2.16 Description Using the Address Sanitizer tool, security researcher Atte Kettunen from OUSPG found an out-of-bounds read while rendering GIF format images. This could cause a non-exploitable crash and could also attempt to render normally inaccesible data as part of the image. References out-of-bounds-read in mozilla::image::RasterImage::DrawFrameTo (CVE-2013-0772) ______________________________________________________________________ Mozilla Foundation Security Advisory 2013-23 Title: Wrapped WebIDL objects can be wrapped again Impact: Critical Announced: February 19, 2013 Reporter: Boris Zbarsky Products: Firefox, Thunderbird, SeaMonkey Fixed in: Firefox 19.0 SeaMonkey 2.16 Description Mozilla developer Boris Zbarsky reported that in some circumstances a wrapped WebIDL object can be wrapped multiple times, overwriting the existing wrapped state. This could lead to an exploitable condition in rare cases. References Wrapping a WebIDL object should beware WrapNativeParent reentering itself (CVE-2013-0765) ______________________________________________________________________ Mozilla Foundation Security Advisory 2013-24 Title: Web content bypass of COW and SOW security wrappers Impact: High Announced: February 19, 2013 Reporter: Bobby Holley Products: Firefox, Thunderbird, SeaMonkey Fixed in: Firefox 19.0 Firefox ESR 17.0.3 Thunderbird 17.0.3 Thunderbird ESR 17.0.3 SeaMonkey 2.16 Description Mozilla developer Bobby Holley discovered that it was possible to bypass some protections in Chrome Object Wrappers (COW) and System Only Wrappers (SOW), making their prototypes mutable by web content. This could be used leak information from chrome objects and possibly allow for arbitrary code execution. In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products. References Have SecurityWrapper deny access for various sketchy SM extensions (CVE-2013-0773) ______________________________________________________________________ Mozilla Foundation Security Advisory 2013-25 Title: Privacy leak in JavaScript Workers Impact: Moderate Announced: February 19, 2013 Reporter: Frederik Braun Products: Firefox, Thunderbird, SeaMonkey Fixed in: Firefox 19.0 Firefox ESR 17.0.3 Thunderbird 17.0.3 Thunderbird ESR 17.0.3 SeaMonkey 2.16 Description Mozilla security researcher Frederik Braun discovered that since Firefox 15 the file system location of the active browser profile was available to JavaScript workers. While not dangerous by itself, this could potentially be combined with other vulnerabilities to target the profile in an attack. In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products. References disclosure of profile directory name in JavaScript variable visible to Workers (CVE-2013-0774) ______________________________________________________________________ Mozilla Foundation Security Advisory 2013-26 Title: Use-after-free in nsImageLoadingContent Impact: Critical Announced: February 19, 2013 Reporter: Nils Products: Firefox, Thunderbird, SeaMonkey Fixed in: Firefox 19.0 Firefox ESR 17.0.3 Thunderbird 17.0.3 Thunderbird ESR 17.0.3 SeaMonkey 2.16 Description Security researcher Nils reported a use-after-free in nsImageLoadingContent when content script is executed. This could allow for arbitrary code execution. In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products. References Use-After-Free crash @xul!nsImageLoadingContent::OnStopContainer (CVE-2013-0775) ______________________________________________________________________ Mozilla Foundation Security Advisory 2013-27 Title: Phishing on HTTPS connection through malicious proxy Impact: High Announced: February 19, 2013 Reporter: Michal Zalewski Products: Firefox, Thunderbird, SeaMonkey Fixed in: Firefox 19.0 Firefox ESR 17.0.3 Thunderbird 17.0.3 Thunderbird ESR 17.0.3 SeaMonkey 2.16 Description Google security researcher Michal Zalewski reported an issue where the browser displayed the content of a proxy's 407 response if a user canceled the proxy's authentication prompt. In this circumstance, the addressbar will continue to show the requested site's address, including HTTPS addresses that appear to be secure. This spoofing of addresses can be used for phishing attacks by fooling users into entering credentials, for example. In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products. References HTTPS can be effectively disabled by attackers on rogue networks using a proxy that returns 407 with embedded script (CVE-2013-0776) ______________________________________________________________________ Mozilla Foundation Security Advisory 2013-28 Title: Use-after-free, out of bounds read, and buffer overflow issues found using Address Sanitizer Impact: Critical Announced: February 19, 2013 Reporter: Abhishek Arya Products: Firefox, Thunderbird, SeaMonkey Fixed in: Firefox 19.0 Firefox ESR 17.0.3 Thunderbird 17.0.3 Thunderbird ESR 17.0.3 SeaMonkey 2.16 Description Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover a series of use-after-free, out of bounds read, and buffer overflow problems rated as low to critical security issues in shipped software. Some of these issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting four additional use-after-free and out of bounds write flaws introduced during Firefox development that were fixed before general release. In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products. References The following issues were fixed in Firefox 19 and ESR 17.0.3: Heap-use-after-free in nsOverflowContinuationTracker::Finish, with -moz-columns (CVE-2013-0780) Heap-buffer-overflow WRITE in nsSaveAsCharset::DoCharsetConversion (CVE-2013-0782) The following issues were fixed in Firefox 19: Heap-use-after-free in nsDisplayBoxShadowOuter::Paint (CVE-2013-0777) Out-of-bounds read in ClusterIterator::NextCluster (CVE-2013-0778) out-of-bounds-read in nsCodingStateMachine::NextState (CVE-2013-0779) Heap-use-after-free in nsPrintEngine::CommonPrint (CVE-2013-0781) ====================================================================== ========================================================= Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================