[USN-3645-1] Firefox vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============0383287364455857836==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol=”application/pgp-signature”;
boundary=”BsUEixdTZdRwIcS0W0FZT6YzsSHHgCZVR”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–BsUEixdTZdRwIcS0W0FZT6YzsSHHgCZVR
Content-Type: multipart/mixed; boundary=”x0CnnCumdHR80XlW9IZG7QGydJOR8NzoX”;
protected-headers=”v1″
From: Chris Coulson
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3645-1] Firefox vulnerabilities

–x0CnnCumdHR80XlW9IZG7QGydJOR8NzoX
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3645-1
May 11, 2018

firefox vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Firefox could be made to crash or run programs as your login if it
opened a malicious website.

Software Description:
– firefox: Mozilla Open Source web browser

Details:

Multiple security issues were discovered in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via application
crash, bypass same-origin restrictions, conduct cross-site scripting (XSS=
)
attacks, install lightweight themes without user interaction, spoof the
filename in the downloads panel, or execute arbitrary code.
(CVE-2018-5150, CVE-2018-5151, CVE-2018-5153, CVE-2018-5154,
CVE-2018-5155, CVE-2018-5157, CVE-2018-5158, CVE-2018-5159, CVE-2018-5160=
,
CVE-2018-5163, CVE-2018-5164, CVE-2018-5168, CVE-2018-5173, CVE-2018-5175=
,
CVE-2018-5177, CVE-2018-5180)

Multiple security issues were discovered with WebExtensions. If a user
were tricked in to installing a specially crafted extension, an attacker
could potentially exploit these to obtain sensitive information, or bypas=
s
security restrictions. (CVE-2018-5152, CVE-2018-5166)

It was discovered that the web console and JavaScript debugger incorrectl=
y
linkified chrome: and javascript URLs. If a user were tricked in to
clicking a specially crafted link, an attacker could potentially exploit
this to conduct cross-site scripting (XSS) attacks. (CVE-2018-5167)

It was discovered that dragging and dropping link text on to the home
button could set the home page to include chrome pages. If a user were
tricked in to dragging and dropping a specially crafted link on to the
home button, an attacker could potentially exploit this bypass security
restrictions. (CVE-2018-5169)

It was discovered that the Live Bookmarks page and PDF viewer would run
script pasted from the clipboard. If a user were tricked in to copying an=
d
pasting specially crafted text, an attacker could potentially exploit thi=
s
to conduct cross-site scripting (XSS) attacks. (CVE-2018-5172)

It was discovered that the JSON viewer incorrectly linkified javascript:
URLs. If a user were tricked in to clicking on a specially crafted link,
an attacker could potentially exploit this to obtain sensitive
information. (CVE-2018-5176)

It was discovered that dragging a file: URL on to a tab that is running i=
n
a different process would cause the file to open in that process. If a
user were tricked in to dragging a file: URL, an attacker could
potentially exploit this to bypass intended security policies.
(CVE-2018-5181)

It was discovered that dragging text that is a file: URL on to the
addressbar would open the specified file. If a user were tricked in to
dragging specially crafted text on to the addressbar, an attacker could
potentially exploit this to bypass intended security policies.
(CVE-2018-5182)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
firefox 60.0+build2-0ubuntu1

Ubuntu 17.10:
firefox 60.0+build2-0ubuntu0.17.10.1

Ubuntu 16.04 LTS:
firefox 60.0+build2-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
firefox 60.0+build2-0ubuntu0.14.04.1

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3645-1
CVE-2018-5150, CVE-2018-5151, CVE-2018-5152, CVE-2018-5153,
CVE-2018-5154, CVE-2018-5155, CVE-2018-5157, CVE-2018-5158,
CVE-2018-5159, CVE-2018-5160, CVE-2018-5163, CVE-2018-5164,
CVE-2018-5166, CVE-2018-5167, CVE-2018-5168, CVE-2018-5169,
CVE-2018-5172, CVE-2018-5173, CVE-2018-5175, CVE-2018-5176,
CVE-2018-5177, CVE-2018-5180, CVE-2018-5181, CVE-2018-5182

Package Information:
https://launchpad.net/ubuntu/+source/firefox/60.0+build2-0ubuntu1
https://launchpad.net/ubuntu/+source/firefox/60.0+build2-0ubuntu0.17.10=
=2E1
https://launchpad.net/ubuntu/+source/firefox/60.0+build2-0ubuntu0.16.04=
=2E1
https://launchpad.net/ubuntu/+source/firefox/60.0+build2-0ubuntu0.14.04=
=2E1

–x0CnnCumdHR80XlW9IZG7QGydJOR8NzoX–

–BsUEixdTZdRwIcS0W0FZT6YzsSHHgCZVR
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQEcBAEBCAAGBQJa9cXEAAoJEGEfvezVlG4P7eIH/25T8a9WRhoam1VL00vsIvob
UQYS6iksUhCz9M9Oh/ElwQCFd5SVqbfeBayg3FiDdlNsLcCE1iY+VzJ2l9Cx9p84
G2ApR5VU5Ge5QfzIgdWlF7gJa3xU4M+DWXREbqTRx+YYrsVFNaE48haE2YdvSPFP
6pEsGvyqI6a2oVEVRYhJCQwIab5i51eLayTDIZSTP9KYBst7de4SJbFmtQUoEns5
VuObOu/9fP/0e3KzcWqXjRX76gitQJohEJtyKCzl5uqIU5Q+8b8kK7CCgjELNLCC
cqr5FQy6B/aW0ryhtepFXxsRwOuwTq6GtmPkx25xTKLA94kYbf5b47Og9dNvoQk=
=7hN8
—–END PGP SIGNATURE—–

–BsUEixdTZdRwIcS0W0FZT6YzsSHHgCZVR–

–===============0383287364455857836==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============0383287364455857836==–