Multiple vulnerabilities have been discovered in Mozilla Firefox and Thunderbird which could allow remote code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Thunderbird is an email client. Successful exploitation of these vulnerabilities could result in either an attacker gaining the same privileges as the logged on user, or gaining session authentication credentials. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.
- Firefox versions prior to 31
- Mozilla Firefox Extended Support Release (ESR) version prior to 24.7
- Thunderbird versions prior to 31
Fourteen vulnerabilities have been reported in Mozilla Firefox and Thunderbird. Details of the vulnerabilities are as follows:
- A security bypass vulnerability exists because the applications fail to properly enforce the same-origin policy. An attacker can use 'frame' tags to bypass same-origin policy and execute arbitrary script code in the context of another domain. [CVE-2014-1552, MFSA 2014-66]
- Three vulnerabilities exist due to a failure to parse SSL certificates that use non-standard character encoding. Use of nonstandard characters in a certificate can cause a potential inability to use valid SSL certificates. [CVE-2014-1558, CVE-2014-1559, CVE-2014-1560, MFSA 2014-65]
- A vulnerability exists in the Skia library when scaling high quality images. If image scaling takes too long, a crash occurs causing image data to be discarded while still in use by the scaling operation. [CVE-2014-1557, MFSA 2014-64]
- A use after free vulnerability exists while manipulating certificates in the trusted cache. A crash can be caused as a result of a pair of NSSCertificate structures being added to a trust domain and then one of them is removed while they are still in use by the trusted cache. [CVE-2014-1544, MFSA 2014-63]
- A use after free vulnerability exists when the FireOnStateChange event is triggered in certain circumstances. [CVE-2014-1555, MFSA 2014-61]
- A vulnerability exists that allows for event spoofing attacks. It is possible to create a drag and drop event in web content which mimics the behavior of a chrome customization event. This can occur when a user is customizing a page or panel. This results in a limited ability to move UI icons within the visible window but does not otherwise affect customization or window content. [CVE-2014-1561, MFSA 2014-60]
- A use after free vulnerability exists due to an error in how font resources and tables are handled when rendering MathML content with DirectWrite fonts. [CVE-2014-1551, MFSA 2014-59]
- A heap use after free memory corruption vulnerability exists in Web Audio due to incorrect control message ordering. [CVE-2014-1550, MFSA 2014-58]
- A remote heap based buffer overflow vulnerability occurs during Web Audio buffering for playback. This occurs because of an error in the amount of allocated memory for buffers. This leads to a potentially exploitable crash with some audio content. [CVE-2014-1549, MFSA 2014-57]
- Two memory corruption vulnerabilities exist in affected versions of Mozilla Firefox. Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. [CVE-2014-1547, CVE-2014-1548, MFSA 2014-56]
Successful exploitation of these vulnerabilities could result in either an attacker gaining the same privileges as the logged on user, or gaining session authentication credentials. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.
We recommend the following actions be taken:
- Update vulnerable Mozilla products immediately after appropriate testing.
- Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
- Remind users not to open email attachments from unknown users or suspicious emails from trusted sources.
- Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.