ITS ADVISORY NUMBER:
Multiple Vulnerabilities in Mozilla Products Could Allow Remote Code Execution
Multiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, and SeaMonkey applications, which could allow remote code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Thunderbird is an email client. Mozilla SeaMonkey is a cross platform Internet suite of tools ranging from a web browser to an email client. Successful exploitation could result in the attacker gaining the same user rights as the current user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- Firefox versions prior to 27.0
- Firefox Extended Support Release (ESR) versions prior to 24.3
- Thunderbird versions prior to 24.3
- SeaMonkey versions prior to 2.24
- Large and medium government entities: High
- Small government entities: High
- Large and medium business entities: High
- Small business entities: High
Home users: High
Multiple vulnerabilities have been reported for various Mozilla products. Details of the vulnerabilities are as follows:
- Several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances., [MFSA 2014-01] [CVE-2014-1477] [CVE-2014-1478]
- A method to bypass System Only Wrappers (SOW) by using XML Binding Language (XBL) content scopes to clone protected XUL elements. [MFSA 2014-02] [CVE-2014-1479]
- Reported that the dialog for saving downloaded files did not implement a security timeout before button selections were processed. [MFSA 2014-03] [CVE-2014-1480]
- Reported issue with image decoding in RasterImage caused by continued use of discarded images. [MFSA 2014-04] [CVE-2014-1482]
- Reported an information leak where document.caretPositionFromPoint and document.elementFromPoint functions could be used on a cross-origin iframe to gain information on the iframe's DOM and other attributes through a timing attack, violating same-origin policy. [MFSA 2014-05] [CVE-2014-1483]
- Profile path leaks to Android system [MFSA 2014-06] [CVE-2014-1484]
- Content Security Policy (CSP) is not in compliance with the specification. [MFSA 2014-07] [CVE-2014-1485]
- Reported a use-after-free during image processing from sites with specific content types. [MFSA 2014-08] [CVE-2014-1486]
- Reported a cross-origin information leak through web workers' error messages. [MFSA 2014-09] [CVE-2014-1487]
- Reported flaw that once users have viewed the default Firefox start page (about:home), subsequent pages they navigate to in that same tab could use script to activate the buttons that were on the about:home page. [MFSA 2014-10] [CVE-2014-1489]
- Reported a crash when terminating a web worker running asm.js code after passing an object between threads. This crash is potentially exploitable. [MFSA 2014-11] [CVE-2014-1488]
- Reported issues with ticket handling in the Network Security Services (NSS) libraries [MFSA 2014-12] [CVE-2014-1490] [CVE-2014-1491]
Successful exploitation of these vulnerabilities could result in either an attacker gaining the same privileges as the logged on user, or gaining session authentication credentials. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.
We recommend the following actions be taken:
- Upgrade vulnerable Mozilla products immediately after appropriate testing.
- Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
- Remind users not to open email attachments from unknown users or suspicious emails from trusted sources.
- Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
- Cyber Security Home
- Incident Reporting
- Breach Notification
- Cyber Advisories
- NYS Digital Forensics
- Cyber Tips Newsletter
- Keeping Kids Safe Online
- Local Government
- Policies and Resources
- NY-ISAC Secure Portal