First published: Tue Mar 27 2018(Updated: )
A use-after-free was discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service or execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/firefox | <59.0.2+build1-0ubuntu0.17.10.1 | 59.0.2+build1-0ubuntu0.17.10.1 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/firefox | <59.0.2+build1-0ubuntu0.16.04.1 | 59.0.2+build1-0ubuntu0.16.04.1 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/firefox | <59.0.2+build1-0ubuntu0.14.04.1 | 59.0.2+build1-0ubuntu0.14.04.1 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3609-1 is critical due to the potential for denial of service and arbitrary code execution.
To fix USN-3609-1, update your Firefox package to version 59.0.2+build1-0ubuntu0.17.10.1, 59.0.2+build1-0ubuntu0.16.04.1, or 59.0.2+build1-0ubuntu0.14.04.1 depending on your Ubuntu version.
USN-3609-1 affects Firefox versions prior to 59.0.2+build1-0ubuntu0.17.10.1, 59.0.2+build1-0ubuntu0.16.04.1, and 59.0.2+build1-0ubuntu0.14.04.1.
The vulnerability in USN-3609-1 is caused by a use-after-free error in Firefox when handling certain web content.
There are no recommended workarounds for USN-3609-1 other than applying the available software updates.