Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2015:0593-2

Опубликовано: 23 мар. 2015
Источник: suse-cvrf

Описание

Security update for MozillaFirefox

MozillaFirefox was updated to the 31.5.3ESR release to fix two security vulnerabilities:

* MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported, through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's implementation of typed array bounds checking in JavaScript just-in-time compilation (JIT) and its management of bounds checking for heap access. This flaw can be leveraged into the reading and writing of memory allowing for arbitrary code execution on the local system. * MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski reported, through HP Zero Day Initiative's Pwn2Own contest, a method to run arbitrary scripts in a privileged context. This bypassed the same-origin policy protections by using a flaw in the processing of SVG format content navigation.

Security Issues:

* CVE-2015-0817 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817> * CVE-2015-0818 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818>

Список пакетов

SUSE Linux Enterprise Server 11 SP1-LTSS
MozillaFirefox-31.5.3esr-0.3.1
MozillaFirefox-translations-31.5.3esr-0.3.1
SUSE Linux Enterprise Server 11 SP1-TERADATA
MozillaFirefox-31.5.3esr-0.3.1
MozillaFirefox-translations-31.5.3esr-0.3.1
SUSE Linux Enterprise Server 11 SP2-LTSS
MozillaFirefox-31.5.3esr-0.3.1
MozillaFirefox-translations-31.5.3esr-0.3.1

Описание

The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:MozillaFirefox-31.5.3esr-0.3.1
SUSE Linux Enterprise Server 11 SP1-LTSS:MozillaFirefox-translations-31.5.3esr-0.3.1
SUSE Linux Enterprise Server 11 SP1-TERADATA:MozillaFirefox-31.5.3esr-0.3.1
SUSE Linux Enterprise Server 11 SP1-TERADATA:MozillaFirefox-translations-31.5.3esr-0.3.1

Ссылки

Описание

Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:MozillaFirefox-31.5.3esr-0.3.1
SUSE Linux Enterprise Server 11 SP1-LTSS:MozillaFirefox-translations-31.5.3esr-0.3.1
SUSE Linux Enterprise Server 11 SP1-TERADATA:MozillaFirefox-31.5.3esr-0.3.1
SUSE Linux Enterprise Server 11 SP1-TERADATA:MozillaFirefox-translations-31.5.3esr-0.3.1

Ссылки
Уязвимость SUSE-SU-2015:0593-2