Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Firefox
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Firefox
ID: USN-3778-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS
Datum: Mi, 3. Oktober 2018, 23:20
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12385
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12386
Applikationen: Mozilla Firefox

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============0439713085103260488==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="UDirKYGoNsrtMTQlNwuY6CyKtqOgnCHg7"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--UDirKYGoNsrtMTQlNwuY6CyKtqOgnCHg7
Content-Type: multipart/mixed;
boundary="TxovEsSZ7Fntop0zgCIEFWa2Pqc2akAvs";
protected-headers="v1"
From: Chris Coulson <chris.coulson@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <8e0259ee-c36f-c507-1698-9e2d2e2d397a@canonical.com>
Subject: [USN-3778-1] Firefox vulnerabilities

--TxovEsSZ7Fntop0zgCIEFWa2Pqc2akAvs
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US

==========================================================================
Ubuntu Security Notice USN-3778-1
October 03, 2018

firefox vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Firefox could be made to crash or run programs as your login if it
opened a malicious website.

Software Description:
- firefox: Mozilla Open Source web browser

Details:

A crash was discovered in TransportSecurityInfo used for SSL, which could
be triggered by data stored in the local cache directory. An attacker
could potentially exploit this in combination with another vulnerability
that allowed them to write data to the cache, to execute arbitrary code.
(CVE-2018-12385)

A type confusion bug was discovered in JavaScript. If a user were tricked
in to opening a specially crafted website, an attacker could exploit this
to cause a denial of service, or execute arbitrary code. (CVE-2018-12386)

It was discovered that the Array.prototype.push could leak memory
addresses to the calling function in some circumstances. An attacker could
exploit this in combination with another vulnerability to help execute
arbitrary code. (CVE-2018-12387)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
firefox 62.0.3+build1-0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
firefox 62.0.3+build1-0ubuntu0.16.04.2

Ubuntu 14.04 LTS:
firefox 62.0.3+build1-0ubuntu0.14.04.2

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3778-1
CVE-2018-12385, CVE-2018-12386, CVE-2018-12387

Package Information:
https://launchpad.net/ubuntu/+source/firefox/62.0.3+build1-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/firefox/62.0.3+build1-0ubuntu0.16.04.2
https://launchpad.net/ubuntu/+source/firefox/62.0.3+build1-0ubuntu0.14.04.2



--TxovEsSZ7Fntop0zgCIEFWa2Pqc2akAvs--

--UDirKYGoNsrtMTQlNwuY6CyKtqOgnCHg7
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAlu016IACgkQYR+97NWU
bg/gjAf/R248JwHg1VLEn8BhbRM8PklG7fDYO7p2Go1VzhlNYtkU9L1dT9bVcmma
EowynUE+O/dV3eOF5rFK8Ok8XjlXNRQ0SGBXSlEVTk1VSOak+l4kRODlEu8y9U65
ginBgSL9KTB1OEDVXqHIeo6mULY9OrMuQJINZ/o3t8KNTx8ak1bgENpbdlnKxaaJ
mebVT2KZuM5ILHxG/IA2zOTXYQJyr4LBUiYCU5h6uxPBnONJDWnnl8RwSSTvfH7b
jORYRLCpmh8mo/Da0EvkobCipyYUK1lyxjD1ObZEJULZzrlbphG5aC7owxAyPWjv
v5jnYMYRcrvbBvY2MYct2WJtyHQVMQ==
=Qhau
-----END PGP SIGNATURE-----

--UDirKYGoNsrtMTQlNwuY6CyKtqOgnCHg7--


--===============0439713085103260488==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============0439713085103260488==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung