USN-3645-1: Firefox vulnerabilities
11 May 2018
Firefox could be made to crash or run programs as your login if it opened a malicious website.
Releases
Packages
- firefox - Mozilla Open Source web browser
Details
Multiple security issues were discovered in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via application
crash, bypass same-origin restrictions, conduct cross-site scripting (XSS)
attacks, install lightweight themes without user interaction, spoof the
filename in the downloads panel, or execute arbitrary code.
(CVE-2018-5150, CVE-2018-5151, CVE-2018-5153, CVE-2018-5154,
CVE-2018-5155, CVE-2018-5157, CVE-2018-5158, CVE-2018-5159, CVE-2018-5160,
CVE-2018-5163, CVE-2018-5164, CVE-2018-5168, CVE-2018-5173, CVE-2018-5175,
CVE-2018-5177, CVE-2018-5180)
Multiple security issues were discovered with WebExtensions. If a user
were tricked in to installing a specially crafted extension, an attacker
could potentially exploit these to obtain sensitive information, or bypass
security restrictions. (CVE-2018-5152, CVE-2018-5166)
It was discovered that the web console and JavaScript debugger incorrectly
linkified chrome: and javascript URLs. If a user were tricked in to
clicking a specially crafted link, an attacker could potentially exploit
this to conduct cross-site scripting (XSS) attacks. (CVE-2018-5167)
It was discovered that dragging and dropping link text on to the home
button could set the home page to include chrome pages. If a user were
tricked in to dragging and dropping a specially crafted link on to the
home button, an attacker could potentially exploit this bypass security
restrictions. (CVE-2018-5169)
It was discovered that the Live Bookmarks page and PDF viewer would run
script pasted from the clipboard. If a user were tricked in to copying and
pasting specially crafted text, an attacker could potentially exploit this
to conduct cross-site scripting (XSS) attacks. (CVE-2018-5172)
It was discovered that the JSON viewer incorrectly linkified javascript:
URLs. If a user were tricked in to clicking on a specially crafted link,
an attacker could potentially exploit this to obtain sensitive
information. (CVE-2018-5176)
It was discovered that dragging a file: URL on to a tab that is running in
a different process would cause the file to open in that process. If a
user were tricked in to dragging a file: URL, an attacker could
potentially exploit this to bypass intended security policies.
(CVE-2018-5181)
It was discovered that dragging text that is a file: URL on to the
addressbar would open the specified file. If a user were tricked in to
dragging specially crafted text on to the addressbar, an attacker could
potentially exploit this to bypass intended security policies.
(CVE-2018-5182)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
Ubuntu 17.10
Ubuntu 16.04
Ubuntu 14.04
After a standard system update you need to restart Firefox to make
all the necessary changes.
References
- CVE-2018-5150
- CVE-2018-5151
- CVE-2018-5152
- CVE-2018-5153
- CVE-2018-5154
- CVE-2018-5155
- CVE-2018-5157
- CVE-2018-5158
- CVE-2018-5159
- CVE-2018-5160
- CVE-2018-5163
- CVE-2018-5164
- CVE-2018-5166
- CVE-2018-5167
- CVE-2018-5168
- CVE-2018-5169
- CVE-2018-5172
- CVE-2018-5173
- CVE-2018-5175
- CVE-2018-5176
- CVE-2018-5177
- CVE-2018-5180
- CVE-2018-5181
- CVE-2018-5182
Related notices
- USN-3660-1: thunderbird-locale-hu, thunderbird-locale-ta, thunderbird-locale-ja, thunderbird-locale-es, thunderbird, thunderbird-locale-el, thunderbird-locale-gd, thunderbird-locale-vi, thunderbird-locale-it, thunderbird-locale-ko, xul-ext-gdata-provider, thunderbird-locale-ro, thunderbird-locale-cy, xul-ext-lightning, thunderbird-dev, thunderbird-locale-pa, thunderbird-locale-ta-lk, thunderbird-locale-ga-ie, thunderbird-locale-eu, thunderbird-locale-sv-se, thunderbird-locale-fi, thunderbird-locale-pt-pt, thunderbird-locale-nl, thunderbird-globalmenu, thunderbird-locale-br, thunderbird-locale-da, thunderbird-locale-hy, thunderbird-locale-zh-hant, thunderbird-locale-en-us, thunderbird-locale-bg, thunderbird-locale-cs, thunderbird-locale-gl, thunderbird-locale-af, thunderbird-locale-sk, thunderbird-locale-fr, thunderbird-gnome-support, thunderbird-locale-pt-br, thunderbird-locale-nn, xul-ext-calendar-timezones, thunderbird-locale-bn, thunderbird-locale-pa-in, thunderbird-locale-dsb, thunderbird-locale-si, thunderbird-locale-es-es, thunderbird-locale-sl, thunderbird-locale-hr, thunderbird-locale-bn-bd, thunderbird-locale-be, thunderbird-locale-ru, thunderbird-locale-mk, thunderbird-locale-kab, thunderbird-locale-nn-no, thunderbird-locale-hsb, thunderbird-locale-is, thunderbird-locale-nb, thunderbird-locale-uk, thunderbird-locale-pl, thunderbird-locale-ast, thunderbird-locale-lt, thunderbird-locale-sq, thunderbird-locale-sr, thunderbird-locale-ca, thunderbird-locale-zh-cn, thunderbird-locale-en, thunderbird-testsuite, thunderbird-mozsymbols, thunderbird-locale-he, thunderbird-locale-es-ar, thunderbird-locale-rm, thunderbird-locale-fy-nl, thunderbird-locale-en-gb, thunderbird-locale-ar, thunderbird-locale-et, thunderbird-locale-sv, thunderbird-locale-zh-tw, thunderbird-locale-ka, thunderbird-locale-de, thunderbird-locale-tr, thunderbird-locale-ga, thunderbird-locale-pt, thunderbird-locale-fy, thunderbird-locale-nb-no, thunderbird-locale-zh-hans, thunderbird-locale-id
- USN-3688-1: mozjs52, libmozjs-52-dev, libmozjs-52-0