Lucene search

K
suseSuseSUSE-SU-2013:1678-1
HistoryNov 15, 2013 - 3:04 a.m.

Security update for Mozilla Firefox (important)

2013-11-1503:04:14
lists.opensuse.org
19

0.111 Low

EPSS

Percentile

94.6%

Mozilla Firefox has been updated to the 17.0.10ESR release,
which fixes various bugs and security issues:

MFSA 2013-93: Mozilla developers identified and fixed
several memory safety bugs in the browser engine used in
Firefox and other Mozilla-based products. Some of these
bugs showed evidence of memory corruption under certain
circumstances, and we presume that with enough effort at
least some of these could be exploited to run arbitrary
code.

Jesse Ruderman and Christoph Diehl reported memory
safety problems and crashes that affect Firefox ESR 17,
Firefox ESR 24, and Firefox 24. (CVE-2013-5590)

Carsten Book reported a crash fixed in the NSS
library used by Mozilla-based products fixed in Firefox 25,
Firefox ESR 24.1, and Firefox ESR 17.0.10.(CVE-2013-1739)

MFSA 2013-95 / CVE-2013-5604: Security researcher
Abhishek Arya (Inferno) of the Google Chrome Security Team
used the Address Sanitizer tool to discover an access
violation due to uninitialized data during Extensible
Stylesheet Language Transformation (XSLT) processing. This
leads to a potentially exploitable crash.

MFSA 2013-96 / CVE-2013-5595: Compiler Engineer Dan
Gohman of Google discovered a flaw in the JavaScript engine
where memory was being incorrectly allocated for some
functions and the calls for allocations were not always
properly checked for overflow, leading to potential buffer
overflows. When combined with other vulnerabilities, these
flaws could be potentially exploitable.

MFSA 2013-98 / CVE-2013-5597: Security researcher
Byoungyoung Lee of Georgia Tech Information Security Center
(GTISC) used the Address Sanitizer tool to discover a
use-after-free during state change events while updating
the offline cache. This leads to a potentially exploitable
crash.

MFSA 2013-100: Security researcher Nils used the
Address Sanitizer tool while fuzzing to discover missing
strong references in browsing engine leading to
use-after-frees. This can lead to a potentially exploitable
crash.

o ASAN heap-use-after-free in
nsIPresShell::GetPresContext() with canvas, onresize and
mozTextStyle (CVE-2013-5599) o ASAN use-after-free in
nsIOService::NewChannelFromURIWithProxyFlags with Blob URL
(CVE-2013-5600) o ASAN use-after free in GC allocation in
nsEventListenerManager::SetEventHandler (CVE-2013-5601)
*

MFSA 2013-101 / CVE-2013-5602: Security researcher
Nils used the Address Sanitizer tool while fuzzing to
discover a memory corruption issue with the JavaScript
engine when using workers with direct proxies. This results
in a potentially exploitable crash.