{"id":"USN-2785-1","summary":"firefox vulnerabilities","details":"Christian Holler, David Major, Jesse Ruderman, Tyson Smith, Boris Zbarsky,\nRandell Jesup, Olli Pettay, Karl Tomlinson, Jeff Walden, Gary Kwong,\nAndrew McCreight, Georg Fritzsche, and Carsten Book discovered multiple\nmemory safety issues in Firefox. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit these to\ncause a denial of service via application crash, or execute arbitrary\ncode with the privileges of the user invoking Firefox. (CVE-2015-4513,\nCVE-2015-4514)\n\nTim Brown discovered that Firefox discloses the hostname during NTLM\nauthentication in some circumstances. If a user were tricked in to\nopening a specially crafted website with NTLM v1 enabled, an attacker\ncould exploit this to obtain sensitive information. (CVE-2015-4515)\n\nMario Heiderich and Frederik Braun discovered that CSP could be bypassed\nin reader mode in some circumstances. If a user were tricked in to opening\na specially crafted website, an attacker could potentially exploit this to\nconduct cross-site scripting (XSS) attacks. (CVE-2015-4518)\n\nTyson Smith and David Keeler discovered a use-after-poison and buffer\noverflow in NSS. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit these to cause a denial of\nservice via application crash, or execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2015-7181, CVE-2015-7182)\n\nRyan Sleevi discovered an integer overflow in NSPR. If a user were tricked\nin to opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via application crash, or\nexecute arbitrary code with the privileges of the user invoking Firefox.\n(CVE-2015-7183)\n\nJason Hamilton, Peter Arremann and Sylvain Giroux discovered that panels\ncreated via the Addon SDK with { script: false } could still execute\ninline script. If a user installed an addon that relied on this as a\nsecurity mechanism, an attacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks, depending on the source of the panel\ncontent. (CVE-2015-7187)\n\nMichał Bentkowski discovered that adding white-space to hostnames that are\nIP address can bypass same-origin protections. If a user were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to conduct cross-site scripting (XSS) attacks.\n(CVE-2015-7188)\n\nLooben Yang discovered a buffer overflow during script interactions with\nthe canvas element in some circumstances. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to cause a denial of service via application crash, or execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2015-7189)\n\nShinto K Anto discovered that CORS preflight is bypassed when receiving\nnon-standard Content-Type headers in some circumstances. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to bypass same-origin restrictions.\n(CVE-2015-7193)\n\nGustavo Grieco discovered a buffer overflow in libjar in some\ncircumstances. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial of\nservice via application crash, or execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2015-7194)\n\nFrans Rosén discovered that certain escaped characters in the Location\nheader are parsed incorrectly, resulting in a navigation to the previously\nparsed version of a URL. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this to obtain site\nspecific tokens. (CVE-2015-7195)\n\nVytautas Staraitis discovered a garbage collection crash when interacting\nwith Java applets in some circumstances. If a user were tricked in to\nopening a specially crafted website with the Java plugin installed, an\nattacker could potentially exploit this to execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2015-7196)\n\nEhsan Akhgari discovered a mechanism for a web worker to bypass secure\nrequirements for web sockets. If a user were tricked in to opening a\nspecially crafted website, an attacker could exploit this to bypass the\nmixed content web socket policy. (CVE-2015-7197)\n\nRonald Crane discovered several vulnerabilities through code-inspection. If\na user were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit these to cause a denial of service via\napplication crash, or execute arbitrary code with the privileges of the\nuser invoking Firefox. (CVE-2015-7198, CVE-2015-7199, CVE-2015-7200)\n","modified":"2026-04-22T09:18:20.679851Z","published":"2015-11-04T23:12:35Z","related":["UBUNTU-CVE-2015-4513","UBUNTU-CVE-2015-4514","UBUNTU-CVE-2015-4515","UBUNTU-CVE-2015-4518","UBUNTU-CVE-2015-7181","UBUNTU-CVE-2015-7182","UBUNTU-CVE-2015-7183","UBUNTU-CVE-2015-7187","UBUNTU-CVE-2015-7188","UBUNTU-CVE-2015-7189","UBUNTU-CVE-2015-7193","UBUNTU-CVE-2015-7194","UBUNTU-CVE-2015-7195","UBUNTU-CVE-2015-7196","UBUNTU-CVE-2015-7197","UBUNTU-CVE-2015-7198","UBUNTU-CVE-2015-7199","UBUNTU-CVE-2015-7200"],"upstream":["CVE-2015-4513","CVE-2015-4514","CVE-2015-4515","CVE-2015-4518","CVE-2015-7181","CVE-2015-7182","CVE-2015-7183","CVE-2015-7187","CVE-2015-7188","CVE-2015-7189","CVE-2015-7193","CVE-2015-7194","CVE-2015-7195","CVE-2015-7196","CVE-2015-7197","CVE-2015-7198","CVE-2015-7199","CVE-2015-7200","UBUNTU-CVE-2015-4513","UBUNTU-CVE-2015-4514","UBUNTU-CVE-2015-4515","UBUNTU-CVE-2015-4518","UBUNTU-CVE-2015-7181","UBUNTU-CVE-2015-7182","UBUNTU-CVE-2015-7183","UBUNTU-CVE-2015-7187","UBUNTU-CVE-2015-7188","UBUNTU-CVE-2015-7189","UBUNTU-CVE-2015-7193","UBUNTU-CVE-2015-7194","UBUNTU-CVE-2015-7195","UBUNTU-CVE-2015-7196","UBUNTU-CVE-2015-7197","UBUNTU-CVE-2015-7198","UBUNTU-CVE-2015-7199","UBUNTU-CVE-2015-7200"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2785-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4513"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4514"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4515"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4518"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7181"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7182"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7183"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7187"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7188"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7189"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7193"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7194"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7195"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7196"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7197"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7198"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7199"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7200"}],"affected":[{"package":{"name":"firefox","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/firefox@42.0+build2-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"42.0+build2-0ubuntu0.14.04.1"}]}],"versions":["24.0+build1-0ubuntu1","25.0+build3-0ubuntu0.13.10.1","28.0~b2+build1-0ubuntu2","28.0+build1-0ubuntu1","28.0+build2-0ubuntu1","28.0+build2-0ubuntu2","29.0+build1-0ubuntu0.14.04.2","30.0+build1-0ubuntu0.14.04.3","31.0+build1-0ubuntu0.14.04.1","32.0+build1-0ubuntu0.14.04.1","32.0.3+build1-0ubuntu0.14.04.1","33.0+build2-0ubuntu0.14.04.1","34.0+build2-0ubuntu0.14.04.1","35.0+build3-0ubuntu0.14.04.2","35.0.1+build1-0ubuntu0.14.04.1","36.0+build2-0ubuntu0.14.04.4","36.0.1+build2-0ubuntu0.14.04.1","36.0.4+build1-0ubuntu0.14.04.1","37.0+build2-0ubuntu0.14.04.1","37.0.1+build1-0ubuntu0.14.04.1","37.0.2+build1-0ubuntu0.14.04.1","38.0+build3-0ubuntu0.14.04.1","39.0+build5-0ubuntu0.14.04.1","39.0.3+build2-0ubuntu0.14.04.1","40.0+build4-0ubuntu0.14.04.1","40.0+build4-0ubuntu0.14.04.4","40.0.3+build1-0ubuntu0.14.04.1","41.0+build3-0ubuntu0.14.04.1","41.0.1+build2-0ubuntu0.14.04.1","41.0.2+build2-0ubuntu0.14.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"firefox","binary_version":"42.0+build2-0ubuntu0.14.04.1"},{"binary_name":"firefox-globalmenu","binary_version":"42.0+build2-0ubuntu0.14.04.1"},{"binary_name":"firefox-mozsymbols","binary_version":"42.0+build2-0ubuntu0.14.04.1"},{"binary_name":"firefox-testsuite","binary_version":"42.0+build2-0ubuntu0.14.04.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4513"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4514"},{"severity":[{"type":"Ubuntu","score":"low"}],"id":"CVE-2015-4515"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-4518"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7181"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7182"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7183"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7187"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7188"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7189"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7193"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7194"},{"severity":[{"type":"Ubuntu","score":"low"}],"id":"CVE-2015-7195"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7196"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7197"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7198"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7199"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-7200"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2785-1.json"}}],"schema_version":"1.7.5"}