Firefox Fixes Vulnerabilities

Tuesday, January 20, 2015 @ 11:01 AM gHale

Mozilla released Firefox 35, which mitigates several critical vulnerabilities.

Nine security holes ended up plugged, three of which rated at the critical level. One of these bugs, reported by MWR Labs researcher Nils, is a Gecko Media Plugin sandbox escape (CVE-2014-8643) affecting the Windows version of Firefox.

Firefox 34 Fixes Vulnerabilities
Firefox 33 Released, Fixes Bugs
Android Browser UXSS Vulnerability
Apple Updates Yosemite, iOS

“The GMP sandbox is currently only used to host h.264 video playback using the OpenH264 plugin but is being developed to host other media plugins. This bug would allow an attacker to escape or bypass the GMP sandbox if another exploitable bug is found in a GMP media plugin which allowed them to compromise the GMP process,” Mozilla officials said in an advisory.

Another critical vulnerability, found by researcher Mitchell Harper, is a read-after-free in WebRTC (CVE-2014-8641) caused by the way tracks end up handled.

“This results in a either a potentially exploitable crash or incorrect WebRTC behavior,” Mozilla said.

Mozilla developers found memory safety bugs in the browser engine (CVE-2014-8634 and CVE-2014-8635). These issues also rated as critical.

Google’s Michal Zalewski (lcamtuf) reported a high-impact uninitialized memory use flaw (CVE-2014-8637) affecting Firefox and the open-source Internet suite SeaMonkey.

“(The researcher) reported that when a malformed bitmap image is rendered by the bitmap decoder within a (canvas) element, memory may not always be properly initialized. The resulting image then uses this uninitialized memory during rendering, allowing data to potentially leak to web content,” Mozilla officials said in the advisory.

The list of vulnerabilities fixed in Firefox 35 also includes an XrayWrapper bypass through DOM objects, a read of uninitialized memory in Web Audio, a cookie injection issue through Proxy Authenticate responses, and a flaw related to the fact that sendBeacon requests lack an Origin header. All of these security bugs have a moderate impact, Mozilla said.

In addition, an Online Certificate Status Protocol (OCSP) response verification failure (CVE-2014-8642), rated as “low,” also ended up fixed.

Leave a Reply

You must be logged in to post a comment.