Mozilla Fixes 13 Holes in Firefox 38

Friday, May 15, 2015 @ 05:05 PM gHale


Mozilla’s latest release of its Firefox web browser fixes eight low, moderate and high severity vulnerabilities, and five critical problems, officials said.

The risks associated with the reported issues run from privilege escalation, bypassing origin restrictions, privacy violations (on Android 4.0 and lower), and accessing data in memory.

RELATED STORIES
Apple Fixes Webkit Flaws in Safari
Ransomware Focuses on Outdated Plug-Ins
Malware Goes Invisible
New Ransomware Hits the Street

One of the serious problems addressed in Firefox 38 refers to an out-of-bounds read and write bug in the JavaScript subset “asm.js” during the validation procedure.

The root of the flaw is an error in defining the heap lengths, and exploitation could lead to reading parts of the memory that may contain sensitive data.

The developer also removed various bugs that could end up exploited to lead to memory corruption problems under certain conditions. In the security advisory Mozilla said “with enough effort at least some of these could be exploited to run arbitrary code.”

Most of the critical bugs solved in the current release of Firefox result in a crash condition of the web browser that could carry out a more damaging attack.

Also, in most of the cases, the issues ended up identified using the Address Sanitizer tool, which can reveal memory corruption type of bugs (use-after-free, buffer overflow).

Mozilla’s browser update also includes an integration with the Adobe Content Decryption Module (CDM), which permits playing DRM-wrapped content in HTML5 video tag.

The decision was the result of providing users with the possibility to access premium video content such as that provided by Netflix. However, DRM is not open source and Mozilla sees it as a “black-box” technology, which prevents implementing various security measures.

To compensate, Mozilla runs the CDM in a sandbox that restricts interaction with sensitive parts of the system and the web browser.



Leave a Reply

You must be logged in to post a comment.