{"id":"USN-2743-1","summary":"firefox vulnerabilities","details":"Andrew Osmond, Olli Pettay, Andrew Sutherland, Christian Holler, David\nMajor, Andrew McCreight, Cameron McCormack, Bob Clary and Randell Jesup\ndiscovered multiple memory safety issues in Firefox. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service via application\ncrash, or execute arbitrary code with the privileges of the user invoking\nFirefox. (CVE-2015-4500, CVE-2015-4501)\n\nAndré Bargull discovered that when a web page creates a scripted proxy\nfor the window with a handler defined a certain way, a reference to the\ninner window will be passed, rather than that of the outer window.\n(CVE-2015-4502)\n\nFelix Gröbert discovered an out-of-bounds read in the QCMS color\nmanagement library in some circumstances. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to cause a denial of service via application crash, or obtain\nsensitive information. (CVE-2015-4504)\n\nKhalil Zhani discovered a buffer overflow when parsing VP9 content in some\ncircumstances. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial of\nservice via application crash, or execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2015-4506)\n\nSpandan Veggalam discovered a crash while using the debugger API in some\ncircumstances. If a user were tricked in to opening a specially crafted\nwebsite whilst using the debugger, an attacker could potentially exploit\nthis to execute arbitrary code with the privileges of the user invoking\nFirefox. (CVE-2015-4507)\n\nJuho Nurminen discovered that the URL bar could display the wrong URL in\nreader mode in some circumstances. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit this to\nconduct URL spoofing attacks. (CVE-2015-4508)\n\nA use-after-free was discovered when manipulating HTML media content in\nsome circumstances. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this to cause a\ndenial of service via application crash, or execute arbitrary code with\nthe privileges of the user invoking Firefox. (CVE-2015-4509)\n\nLooben Yang discovered a use-after-free when using a shared worker with\nIndexedDB in some circumstances. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit this to\ncause a denial of service via application crash, or execute arbitrary code\nwith the privileges of the user invoking Firefox. (CVE-2015-4510)\n\nFrancisco Alonso discovered an out-of-bounds read during 2D canvas\nrendering in some circumstances. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit this to\nobtain sensitive information. (CVE-2015-4512)\n\nJeff Walden discovered that changes could be made to immutable properties\nin some circumstances. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this to execute\narbitrary script in a privileged scope. (CVE-2015-4516)\n\nRonald Crane reported multiple vulnerabilities. If a user were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit these to cause a denial of service via application crash, or\nexecute arbitrary code with the privileges of the user invoking Firefox.\n(CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174,\nCVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180)\n\nMario Gomes discovered that dragging and dropping an image after a\nredirect exposes the redirected URL to scripts. An attacker could\npotentially exploit this to obtain sensitive information. (CVE-2015-4519)\n\nEhsan Akhgari discovered 2 issues with CORS preflight requests. An\nattacker could potentially exploit these to bypass CORS restrictions.\n(CVE-2015-4520)\n","modified":"2026-04-22T09:16:54.107475Z","published":"2015-09-22T22:08:43Z","related":["UBUNTU-CVE-2015-4500","UBUNTU-CVE-2015-4501","UBUNTU-CVE-2015-4502","UBUNTU-CVE-2015-4504","UBUNTU-CVE-2015-4506","UBUNTU-CVE-2015-4507","UBUNTU-CVE-2015-4508","UBUNTU-CVE-2015-4509","UBUNTU-CVE-2015-4510","UBUNTU-CVE-2015-4512","UBUNTU-CVE-2015-4516","UBUNTU-CVE-2015-4517","UBUNTU-CVE-2015-4519","UBUNTU-CVE-2015-4520","UBUNTU-CVE-2015-4521","UBUNTU-CVE-2015-4522","UBUNTU-CVE-2015-7174","UBUNTU-CVE-2015-7175","UBUNTU-CVE-2015-7176","UBUNTU-CVE-2015-7177","UBUNTU-CVE-2015-7180"],"upstream":["CVE-2015-4500","CVE-2015-4501","CVE-2015-4502","CVE-2015-4504","CVE-2015-4506","CVE-2015-4507","CVE-2015-4508","CVE-2015-4509","CVE-2015-4510","CVE-2015-4512","CVE-2015-4516","CVE-2015-4517","CVE-2015-4519","CVE-2015-4520","CVE-2015-4521","CVE-2015-4522","CVE-2015-7174","CVE-2015-7175","CVE-2015-7176","CVE-2015-7177","CVE-2015-7180","UBUNTU-CVE-2015-4500","UBUNTU-CVE-2015-4501","UBUNTU-CVE-2015-4502","UBUNTU-CVE-2015-4504","UBUNTU-CVE-2015-4506","UBUNTU-CVE-2015-4507","UBUNTU-CVE-2015-4508","UBUNTU-CVE-2015-4509","UBUNTU-CVE-2015-4510","UBUNTU-CVE-2015-4512","UBUNTU-CVE-2015-4516","UBUNTU-CVE-2015-4517","UBUNTU-CVE-2015-4519","UBUNTU-CVE-2015-4520","UBUNTU-CVE-2015-4521","UBUNTU-CVE-2015-4522","UBUNTU-CVE-2015-7174","UBUNTU-CVE-2015-7175","UBUNTU-CVE-2015-7176","UBUNTU-CVE-2015-7177","UBUNTU-CVE-2015-7180"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2743-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4500"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4501"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4502"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4504"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4506"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4507"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4508"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4509"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4510"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4512"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4516"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4517"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4519"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4520"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4521"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4522"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7174"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7175"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7176"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7177"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7180"}],"affected":[{"package":{"name":"firefox","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/firefox@41.0+build3-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"41.0+build3-0ubuntu0.14.04.1"}]}],"versions":["24.0+build1-0ubuntu1","25.0+build3-0ubuntu0.13.10.1","28.0~b2+build1-0ubuntu2","28.0+build1-0ubuntu1","28.0+build2-0ubuntu1","28.0+build2-0ubuntu2","29.0+build1-0ubuntu0.14.04.2","30.0+build1-0ubuntu0.14.04.3","31.0+build1-0ubuntu0.14.04.1","32.0+build1-0ubuntu0.14.04.1","32.0.3+build1-0ubuntu0.14.04.1","33.0+build2-0ubuntu0.14.04.1","34.0+build2-0ubuntu0.14.04.1","35.0+build3-0ubuntu0.14.04.2","35.0.1+build1-0ubuntu0.14.04.1","36.0+build2-0ubuntu0.14.04.4","36.0.1+build2-0ubuntu0.14.04.1","36.0.4+build1-0ubuntu0.14.04.1","37.0+build2-0ubuntu0.14.04.1","37.0.1+build1-0ubuntu0.14.04.1","37.0.2+build1-0ubuntu0.14.04.1","38.0+build3-0ubuntu0.14.04.1","39.0+build5-0ubuntu0.14.04.1","39.0.3+build2-0ubuntu0.14.04.1","40.0+build4-0ubuntu0.14.04.1","40.0+build4-0ubuntu0.14.04.4","40.0.3+build1-0ubuntu0.14.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"firefox","binary_version":"41.0+build3-0ubuntu0.14.04.1"},{"binary_name":"firefox-globalmenu","binary_version":"41.0+build3-0ubuntu0.14.04.1"},{"binary_name":"firefox-mozsymbols","binary_version":"41.0+build3-0ubuntu0.14.04.1"},{"binary_name":"firefox-testsuite","binary_version":"41.0+build3-0ubuntu0.14.04.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4500"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4501"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4502"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4504"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4506"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4507"},{"severity":[{"type":"Ubuntu","score":"low"}],"id":"CVE-2015-4508"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4509"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4510"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4512"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4516"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4517"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4519"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4520"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4521"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4522"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7174"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7175"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7176"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7177"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7180"}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2743-1.json"}}],"schema_version":"1.7.5"}