First published: Mon Feb 20 2023(Updated: )
Christian Holler discovered that Firefox did not properly manage memory when using PKCS 12 Safe Bag attributes. An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes. (CVE-2023-0767) Johan Carlsson discovered that Firefox did not properly manage child iframe's unredacted URI when using Content-Security-Policy-Report-Only header. An attacker could potentially exploits this to obtain sensitive information. (CVE-2023-25728) Vitor Torres discovered that Firefox did not properly manage permissions of extensions interaction via ExpandedPrincipals. An attacker could potentially exploits this issue to download malicious files or execute arbitrary code. (CVE-2023-25729) Irvan Kurniawan discovered that Firefox did not properly validate background script invoking requestFullscreen. An attacker could potentially exploit this issue to perform spoofing attacks. (CVE-2023-25730) Ronald Crane discovered that Firefox did not properly manage memory when using EncodeInputStream in xpcom. An attacker could potentially exploits this issue to cause a denial of service. (CVE-2023-25732) Samuel Grob discovered that Firefox did not properly manage memory when using wrappers wrapping a scripted proxy. An attacker could potentially exploits this issue to cause a denial of service. (CVE-2023-25735) Holger Fuhrmannek discovered that Firefox did not properly manage memory when using Module load requests. An attacker could potentially exploits this issue to cause a denial of service. (CVE-2023-25739) Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. (CVE-2023-25731, CVE-2023-25733, CVE-2023-25736, CVE-2023-25737, CVE-2023-25741, CVE-2023-25742, CVE-2023-25744, CVE-2023-25745)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/firefox | <110.0+build3-0ubuntu0.20.04.1 | 110.0+build3-0ubuntu0.20.04.1 |
=20.04 | ||
All of | ||
ubuntu/firefox | <110.0+build3-0ubuntu0.18.04.1 | 110.0+build3-0ubuntu0.18.04.1 |
=18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID of this security update is CVE-2023-0767.
The severity of CVE-2023-0767 is not mentioned in the provided information.
An attacker can exploit CVE-2023-0767 by constructing a PKCS 12 cert bundle in a way that allows for arbitrary memory writes.
The software versions affected by CVE-2023-0767 are Firefox 110.0+build3-0ubuntu0.20.04.1 and Firefox 110.0+build3-0ubuntu0.18.04.1 on Ubuntu 20.04 and Ubuntu 18.04 respectively.
You can fix the vulnerabilities by updating your Firefox software to version 110.0+build3-0ubuntu0.20.04.1 if you are using Ubuntu 20.04, or to version 110.0+build3-0ubuntu0.18.04.1 if you are using Ubuntu 18.04.