Advisory Published

USN-5880-1: Firefox vulnerabilities

First published: Mon Feb 20 2023(Updated: )

Christian Holler discovered that Firefox did not properly manage memory when using PKCS 12 Safe Bag attributes. An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes. (CVE-2023-0767) Johan Carlsson discovered that Firefox did not properly manage child iframe's unredacted URI when using Content-Security-Policy-Report-Only header. An attacker could potentially exploits this to obtain sensitive information. (CVE-2023-25728) Vitor Torres discovered that Firefox did not properly manage permissions of extensions interaction via ExpandedPrincipals. An attacker could potentially exploits this issue to download malicious files or execute arbitrary code. (CVE-2023-25729) Irvan Kurniawan discovered that Firefox did not properly validate background script invoking requestFullscreen. An attacker could potentially exploit this issue to perform spoofing attacks. (CVE-2023-25730) Ronald Crane discovered that Firefox did not properly manage memory when using EncodeInputStream in xpcom. An attacker could potentially exploits this issue to cause a denial of service. (CVE-2023-25732) Samuel Grob discovered that Firefox did not properly manage memory when using wrappers wrapping a scripted proxy. An attacker could potentially exploits this issue to cause a denial of service. (CVE-2023-25735) Holger Fuhrmannek discovered that Firefox did not properly manage memory when using Module load requests. An attacker could potentially exploits this issue to cause a denial of service. (CVE-2023-25739) Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. (CVE-2023-25731, CVE-2023-25733, CVE-2023-25736, CVE-2023-25737, CVE-2023-25741, CVE-2023-25742, CVE-2023-25744, CVE-2023-25745)

Affected SoftwareAffected VersionHow to fix
All of
ubuntu/firefox<110.0+build3-0ubuntu0.20.04.1
110.0+build3-0ubuntu0.20.04.1
=20.04
All of
ubuntu/firefox<110.0+build3-0ubuntu0.18.04.1
110.0+build3-0ubuntu0.18.04.1
=18.04

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID of this security update?

    The vulnerability ID of this security update is CVE-2023-0767.

  • What is the severity of CVE-2023-0767?

    The severity of CVE-2023-0767 is not mentioned in the provided information.

  • How can an attacker exploit CVE-2023-0767?

    An attacker can exploit CVE-2023-0767 by constructing a PKCS 12 cert bundle in a way that allows for arbitrary memory writes.

  • Which software versions are affected by CVE-2023-0767?

    The software versions affected by CVE-2023-0767 are Firefox 110.0+build3-0ubuntu0.20.04.1 and Firefox 110.0+build3-0ubuntu0.18.04.1 on Ubuntu 20.04 and Ubuntu 18.04 respectively.

  • How can I fix the vulnerabilities?

    You can fix the vulnerabilities by updating your Firefox software to version 110.0+build3-0ubuntu0.20.04.1 if you are using Ubuntu 20.04, or to version 110.0+build3-0ubuntu0.18.04.1 if you are using Ubuntu 18.04.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203