SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Mozilla Firefox Vendors:   Mozilla.org
(CentOS Issues Fix) Mozilla Firefox Use-After-Free in nsIPresShell Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1033404
SecurityTracker URL:  http://securitytracker.com/id/1033404
CVE Reference:   CVE-2015-4497   (Links to External Site)
Date:  Aug 28 2015
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 40.0.3
Description:   A vulnerability was reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted content that triggers a resize event where the referenced '<canvas>' element undergoes a style change that deletes the original canvas reference. When the content is loaded by the target user, a use-after-free memory error will occur in nsIPresShell and arbitrary code will be executed on the target user's system.

Jean-Max Reymond reported this vulnerability. Ucha Gobejishvili (via HP's Zero Day Initiative) later reported this vulnerability.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   CentOS has issued a fix.

i386:
4accd0ef78beb2cffe7de1eb2cb077d3260d2be1254241b94dcabd5429668ffa firefox-38.2.1-1.el5.centos.i386.rpm

x86_64:
4accd0ef78beb2cffe7de1eb2cb077d3260d2be1254241b94dcabd5429668ffa firefox-38.2.1-1.el5.centos.i386.rpm
ee12a3a8a5ef058838bb608ec2f7bedb4033c0a4494b14e562d0567f98b8fad6 firefox-38.2.1-1.el5.centos.x86_64.rpm

Source:
c90518b13fdd40682ddfed92ebff461d50ba1b4504e553119caf965de91e5892 firefox-38.2.1-1.el5.centos.src.rpm

i386:
1de25353a5da5a88b766f833b08fd919232f64d8c4bd22c21dc7a2a942a5882f firefox-38.2.1-1.el6.centos.i686.rpm

x86_64:
1de25353a5da5a88b766f833b08fd919232f64d8c4bd22c21dc7a2a942a5882f firefox-38.2.1-1.el6.centos.i686.rpm
cde86c052706e5e98ab2fd10657d9e538e0f30ba96765f2f31986a60e1f49c5e firefox-38.2.1-1.el6.centos.x86_64.rpm

Source:
e798d96ab134c3116832be3e7245e144d2a4929fc413114e7e501303ac7e6d89 firefox-38.2.1-1.el6.centos.src.rpm

x86_64:
ccd6daae6b5970ffd6d52ea9ef5b7fe86f7fe70433769e107da8e6e120f5cdda firefox-38.2.1-1.el7.centos.i686.rpm
8f0427d72b51874513dcff75cea91a9ad9c6df842274fa10962599793f07cb0e firefox-38.2.1-1.el7.centos.x86_64.rpm

Source:
39557ff01ea4da417e94adec1aa984713f4228164e660abec3fbb8357cff126d firefox-38.2.1-1.el7.centos.src.rpm

Cause:   Access control error
Underlying OS:  Linux (CentOS)
Underlying OS Comments:  5, 6, 7

Message History:   This archive entry is a follow-up to the message listed below.
Aug 27 2015 Mozilla Firefox Use-After-Free in nsIPresShell Lets Remote Users Execute Arbitrary Code



 Source Message Contents

Subject:  [CentOS-announce] CESA-2015:1693 Critical CentOS 7 firefox Security Update


CentOS Errata and Security Advisory 2015:1693 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1693.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
ccd6daae6b5970ffd6d52ea9ef5b7fe86f7fe70433769e107da8e6e120f5cdda  firefox-38.2.1-1.el7.centos.i686.rpm
8f0427d72b51874513dcff75cea91a9ad9c6df842274fa10962599793f07cb0e  firefox-38.2.1-1.el7.centos.x86_64.rpm

Source:
39557ff01ea4da417e94adec1aa984713f4228164e660abec3fbb8357cff126d  firefox-38.2.1-1.el7.centos.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC