First published: Thu Nov 16 2017(Updated: )
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, read uninitialized memory, obtain sensitive information, bypass same-origin restrictions, bypass CSP protections, bypass mixed content blocking, spoof the addressbar, or execute arbitrary code. (CVE-2017-7826, CVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831, CVE-2017-7832, CVE-2017-7833, CVE-2017-7834, CVE-2017-7835, CVE-2017-7837, CVE-2017-7838, CVE-2017-7842) It was discovered that javascript: URLs pasted in to the addressbar would be executed instead of being blocked in some circumstances. If a user were tricked in to copying a specially crafted URL in to the addressbar, an attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2017-7839) It was discovered that exported bookmarks do not strip script elements from user-supplied tags. If a user were tricked in to adding specially crafted tags to bookmarks, exporting them and then opening the resulting HTML file, an attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2017-7840)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/firefox | <57.0+build4-0ubuntu0.17.10.5 | 57.0+build4-0ubuntu0.17.10.5 |
=17.10 | ||
All of | ||
ubuntu/firefox | <57.0+build4-0ubuntu0.17.04.5 | 57.0+build4-0ubuntu0.17.04.5 |
=17.04 | ||
All of | ||
ubuntu/firefox | <57.0+build4-0ubuntu0.16.04.5 | 57.0+build4-0ubuntu0.16.04.5 |
=16.04 | ||
All of | ||
ubuntu/firefox | <57.0+build4-0ubuntu0.14.04.4 | 57.0+build4-0ubuntu0.14.04.4 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-3477-1 is high.
An attacker can exploit the vulnerabilities by tricking a user into opening a specially crafted website.
The potential impacts include denial of service, reading uninitialized memory, obtaining sensitive information, bypassing same-origin restrictions, and bypassing CSP protections.
The affected software in USN-3477-1 is Firefox.
To fix the vulnerabilities, update Firefox to version 57.0+build4-0ubuntu0.17.10.5 (for Ubuntu 17.10), 57.0+build4-0ubuntu0.17.04.5 (for Ubuntu 17.04), 57.0+build4-0ubuntu0.16.04.5 (for Ubuntu 16.04), or 57.0+build4-0ubuntu0.14.04.4 (for Ubuntu 14.04).