9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.278 Low
EPSS
Percentile
96.8%
USN-2743-1 fixed vulnerabilities in Firefox. Future Firefox updates will require all addons be signed and unity-firefox-extension, webapps-greasemonkey and webaccounts-browser-extension will not go through the signing process. Because these addons currently break search engine installations (LP: #1069793), this update permanently disables the addons by removing them from the system.
We apologize for any inconvenience.
Andrew Osmond, Olli Pettay, Andrew Sutherland, Christian Holler, David Major, Andrew McCreight, Cameron McCormack, Bob Clary and Randell Jesup discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4500, CVE-2015-4501)
Andre Bargull discovered that when a web page creates a scripted proxy for the window with a handler defined a certain way, a reference to the inner window will be passed, rather than that of the outer window. (CVE-2015-4502)
Felix Grobert discovered an out-of-bounds read in the QCMS color management library in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or obtain sensitive information. (CVE-2015-4504)
Khalil Zhani discovered a buffer overflow when parsing VP9 content in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4506)
Spandan Veggalam discovered a crash while using the debugger API in some circumstances. If a user were tricked in to opening a specially crafted website whilst using the debugger, an attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4507)
Juho Nurminen discovered that the URL bar could display the wrong URL in reader mode in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to conduct URL spoofing attacks. (CVE-2015-4508)
A use-after-free was discovered when manipulating HTML media content in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4509)
Looben Yang discovered a use-after-free when using a shared worker with IndexedDB in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox.
(CVE-2015-4510)
Francisco Alonso discovered an out-of-bounds read during 2D canvas rendering in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information. (CVE-2015-4512)
Jeff Walden discovered that changes could be made to immutable properties in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to execute arbitrary script in a privileged scope. (CVE-2015-4516)
Ronald Crane reported multiple vulnerabilities. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox.
(CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180)
Mario Gomes discovered that dragging and dropping an image after a redirect exposes the redirected URL to scripts. An attacker could potentially exploit this to obtain sensitive information. (CVE-2015-4519)
Ehsan Akhgari discovered 2 issues with CORS preflight requests. An attacker could potentially exploit these to bypass CORS restrictions. (CVE-2015-4520).
Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Ubuntu Security Notice USN-2743-3. The text
# itself is copyright (C) Canonical, Inc. See
# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered
# trademark of Canonical, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(86144);
script_version("2.13");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/10/23");
script_cve_id(
"CVE-2015-4500",
"CVE-2015-4501",
"CVE-2015-4502",
"CVE-2015-4504",
"CVE-2015-4506",
"CVE-2015-4507",
"CVE-2015-4508",
"CVE-2015-4509",
"CVE-2015-4510",
"CVE-2015-4512",
"CVE-2015-4516",
"CVE-2015-4517",
"CVE-2015-4519",
"CVE-2015-4520",
"CVE-2015-4521",
"CVE-2015-4522",
"CVE-2015-7174",
"CVE-2015-7175",
"CVE-2015-7176",
"CVE-2015-7177",
"CVE-2015-7180"
);
script_xref(name:"USN", value:"2743-3");
script_name(english:"Ubuntu 14.04 LTS : Unity Integration for Firefox, Unity Websites Integration and Ubuntu Online Accounts extension update (USN-2743-3)");
script_set_attribute(attribute:"synopsis", value:
"The remote Ubuntu host is missing a security update.");
script_set_attribute(attribute:"description", value:
"USN-2743-1 fixed vulnerabilities in Firefox. Future Firefox updates
will require all addons be signed and unity-firefox-extension,
webapps-greasemonkey and webaccounts-browser-extension will not go
through the signing process. Because these addons currently break
search engine installations (LP: #1069793), this update permanently
disables the addons by removing them from the system.
We apologize for any inconvenience.
Andrew Osmond, Olli Pettay, Andrew Sutherland, Christian Holler, David
Major, Andrew McCreight, Cameron McCormack, Bob Clary and Randell
Jesup discovered multiple memory safety issues in Firefox. If a user
were tricked in to opening a specially crafted website, an attacker
could potentially exploit these to cause a denial of service via
application crash, or execute arbitrary code with the privileges of
the user invoking Firefox. (CVE-2015-4500, CVE-2015-4501)
Andre Bargull discovered that when a web page creates a
scripted proxy for the window with a handler defined a
certain way, a reference to the inner window will be passed,
rather than that of the outer window. (CVE-2015-4502)
Felix Grobert discovered an out-of-bounds read in the QCMS
color management library in some circumstances. If a user
were tricked in to opening a specially crafted website, an
attacker could potentially exploit this to cause a denial of
service via application crash, or obtain sensitive
information. (CVE-2015-4504)
Khalil Zhani discovered a buffer overflow when parsing VP9
content in some circumstances. If a user were tricked in to
opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via
application crash, or execute arbitrary code with the
privileges of the user invoking Firefox. (CVE-2015-4506)
Spandan Veggalam discovered a crash while using the debugger
API in some circumstances. If a user were tricked in to
opening a specially crafted website whilst using the
debugger, an attacker could potentially exploit this to
execute arbitrary code with the privileges of the user
invoking Firefox. (CVE-2015-4507)
Juho Nurminen discovered that the URL bar could display the
wrong URL in reader mode in some circumstances. If a user
were tricked in to opening a specially crafted website, an
attacker could potentially exploit this to conduct URL
spoofing attacks. (CVE-2015-4508)
A use-after-free was discovered when manipulating HTML media
content in some circumstances. If a user were tricked in to
opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via
application crash, or execute arbitrary code with the
privileges of the user invoking Firefox. (CVE-2015-4509)
Looben Yang discovered a use-after-free when using a shared
worker with IndexedDB in some circumstances. If a user were
tricked in to opening a specially crafted website, an
attacker could potentially exploit this to cause a denial of
service via application crash, or execute arbitrary code
with the privileges of the user invoking Firefox.
(CVE-2015-4510)
Francisco Alonso discovered an out-of-bounds read during 2D
canvas rendering in some circumstances. If a user were
tricked in to opening a specially crafted website, an
attacker could potentially exploit this to obtain sensitive
information. (CVE-2015-4512)
Jeff Walden discovered that changes could be made to
immutable properties in some circumstances. If a user were
tricked in to opening a specially crafted website, an
attacker could potentially exploit this to execute arbitrary
script in a privileged scope. (CVE-2015-4516)
Ronald Crane reported multiple vulnerabilities. If a user
were tricked in to opening a specially crafted website, an
attacker could potentially exploit these to cause a denial
of service via application crash, or execute arbitrary code
with the privileges of the user invoking Firefox.
(CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174,
CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180)
Mario Gomes discovered that dragging and dropping an image
after a redirect exposes the redirected URL to scripts. An
attacker could potentially exploit this to obtain sensitive
information. (CVE-2015-4519)
Ehsan Akhgari discovered 2 issues with CORS preflight
requests. An attacker could potentially exploit these to
bypass CORS restrictions. (CVE-2015-4520).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
script_set_attribute(attribute:"see_also", value:"https://ubuntu.com/security/notices/USN-2743-3");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-4516");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2015/09/24");
script_set_attribute(attribute:"patch_publication_date", value:"2015/09/24");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/09/25");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:xul-ext-unity");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:xul-ext-webaccounts");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:xul-ext-websites-integration");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04:-:lts");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libufe-xidgetter0");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:webaccounts-chromium-extension");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:webaccounts-extension-common");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Ubuntu Local Security Checks");
script_copyright(english:"Ubuntu Security Notice (C) 2015-2020 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
exit(0);
}
include('debian_package.inc');
if ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/Ubuntu/release');
if ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');
os_release = chomp(os_release);
if (! ('14.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 14.04', 'Ubuntu ' + os_release);
if ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);
var pkgs = [
{'osver': '14.04', 'pkgname': 'libufe-xidgetter0', 'pkgver': '3.0.0+14.04.20140416-0ubuntu1.14.04.1'},
{'osver': '14.04', 'pkgname': 'webaccounts-chromium-extension', 'pkgver': '0.5-0ubuntu2.14.04.1'},
{'osver': '14.04', 'pkgname': 'webaccounts-extension-common', 'pkgver': '0.5-0ubuntu2.14.04.1'},
{'osver': '14.04', 'pkgname': 'xul-ext-unity', 'pkgver': '3.0.0+14.04.20140416-0ubuntu1.14.04.1'},
{'osver': '14.04', 'pkgname': 'xul-ext-webaccounts', 'pkgver': '0.5-0ubuntu2.14.04.1'},
{'osver': '14.04', 'pkgname': 'xul-ext-websites-integration', 'pkgver': '2.3.6+13.10.20130920.1-0ubuntu1.2'}
];
var flag = 0;
foreach package_array ( pkgs ) {
var osver = NULL;
var pkgname = NULL;
var pkgver = NULL;
if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];
if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];
if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];
if (osver && pkgname && pkgver) {
if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : ubuntu_report_get()
);
exit(0);
}
else
{
var tested = ubuntu_pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'libufe-xidgetter0 / webaccounts-chromium-extension / etc');
}
Vendor | Product | Version | CPE |
---|---|---|---|
canonical | ubuntu_linux | xul-ext-unity | p-cpe:/a:canonical:ubuntu_linux:xul-ext-unity |
canonical | ubuntu_linux | xul-ext-webaccounts | p-cpe:/a:canonical:ubuntu_linux:xul-ext-webaccounts |
canonical | ubuntu_linux | xul-ext-websites-integration | p-cpe:/a:canonical:ubuntu_linux:xul-ext-websites-integration |
canonical | ubuntu_linux | 14.04 | cpe:/o:canonical:ubuntu_linux:14.04:-:lts |
canonical | ubuntu_linux | libufe-xidgetter0 | p-cpe:/a:canonical:ubuntu_linux:libufe-xidgetter0 |
canonical | ubuntu_linux | webaccounts-chromium-extension | p-cpe:/a:canonical:ubuntu_linux:webaccounts-chromium-extension |
canonical | ubuntu_linux | webaccounts-extension-common | p-cpe:/a:canonical:ubuntu_linux:webaccounts-extension-common |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4501
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4502
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4504
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4508
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4510
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4512
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4516
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
ubuntu.com/security/notices/USN-2743-3