Skip to main content
Learn More
McNeese Information Security

Multiple Vulnerabilities in Mozilla Products

Multiple Vulnerabilities in Mozilla Products

CIS ADVISORY NUMBER: 2014-062

Executive Summary

07/23/2014
Multiple vulnerabilities have been identified in Mozilla Firefox and Thunderbird which could allow for remote code execution. Mozilla Firefox is a web browser used to access the Internet and Mozilla Thunderbird is an email client. Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the logged on user, or gaining session authentication credentials. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.

Threat Intelligence

There are currently no reports of these vulnerabilities being exploited in the wild.

System Affected

  • Mozilla Firefox versions prior to 31
  • Mozilla Firefox Extended Support Release (ESR) version prior to 24.7
  • Mozilla Thunderbird versions prior to 31

Risk

Government
  • Large and medium government entities: High
  • Small government entities: High
Businesses
  • Large and medium business entities: High
  • Small business entities: High
Home users
  • High

Technical Summary

Fourteen vulnerabilities have been reported in Mozilla Firefox and Thunderbird. Details of the vulnerabilities are as follows:
  • A security bypass vulnerability exists because the applications fail to properly enforce the same-origin policy. An attacker can use ‘frame’ tags to bypass same-origin policy and execute arbitrary script code in the context of another domain. [CVE-2014-1552, MFSA 2014-66]
  • Three vulnerabilities exist due to a failure to parse SSL certificates that use non-standard character encoding. Use of nonstandard characters in a certificate can cause a potential inability to use valid SSL certificates. [CVE-2014-1558, CVE-2014-1559, CVE-2014-1560, MFSA 2014-65]
  • A vulnerability exists in the Skia library when scaling high quality images. If image scaling takes too long, a crash occurs causing image data to be discarded while still in use by the scaling operation. [CVE-2014-1557, MFSA 2014-64]
  • A use after free vulnerability exists while manipulating certificates in the trusted cache. A crash can be caused as a result of a pair of NSSCertificate structures being added to a trust domain and then one of them is removed while they are still in use by the trusted cache. [CVE-2014-1544, MFSA 2014-63]
  • A remote code execution vulnerability exists in these applications when using the Cesium JavaScript library to generate WebGL content. [CVE-2014-1556, MFSA 2014-62]
  • A use after free vulnerability exists when the FireOnStateChange event is triggered in certain ciscumstances. [CVE-2014-1555, MFSA 2014-61]
  • A vulnerability exists that allows for event spoofing attacks. It is possible to create a drag and drop event in web content which mimics the behavior of a chrome customization event. This can occur when a user is customizing a page or panel. This results in a limited ability to move UI icons within the visible window but does not otherwise affect customization or window content. [CVE-2014-1561, MFSA 2014-60]
  • A use after free vulnerability exists due to an error in how font resources and tables are handled when rendering MathML content with DirectWrite fonts. [CVE-2014-1551, MFSA 2014-59]
  • A heap use after free memory corruption vulnerability exists in Web Audio due to incorrect control message ordering. [CVE-2014-1550, MFSA 2014-58]
  • A remote heap based buffer overflow vulnerability occurs during Web Audio buffering for playback. This occurs because of an error in the amount of allocated memory for buffers. This leads to a potentially exploitable crash with some audio content. [CVE-2014-1549, MFSA 2014-57]
  • Two memory corruption vulnerabilities exist in affected versions of Mozilla Firefox. Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. [CVE-2014-1547, CVE-2014-1548, MFSA 2014-56]
Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the logged on user, or gaining session authentication credentials. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.

Recommendations

We recommend the following actions be taken:
  • Apply appropriate patches provided by Mozilla to vulnerable systems immediately after appropriate testing.
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to click links from unknown sources, or to click links without verifying the intended destination.

References

Mozilla
CVE
Security Focus

TLP:WHITE
Traffic Light Protocol (TLP): WHITE information may be distributed without restriction, subject to copyright controls.
http://www.us-cert.gov/tlp/
 
Note: This alert is intended to identify system-related announcements (system exploits, vulnerabilities, virus attacks, etc.) The information is obtained from several sources including the DHS/US-CERT, SANS, and vendor community. The OIT security office does not validate the information. The intent is to alert the agency personnel on possible exploits, system vulnerabilities, virus attacks and hacker attacks. In each instance we will attempt to provide a specific address relative to the problem and the corresponding patch or fix.

OIT-SEC-ALERT@LISTSERV.DOA.LA.GOV