概要
リモートの Windows ホストにインストールされている Web ブラウザは、複数の脆弱性の影響を受けます。
説明
リモートのWindowsホストにインストールされているMozilla Firefoxのバージョンは63より前です。したがって、以下の複数の脆弱性による影響を受けます。
- During HTTP Live Stream playback on Firefox for Android, audio data can be accessed across origins in violation of security policies. この問題は基盤となるAndroidサービスにあるため、すべてのHLSストリームをオリジン間として扱い、アクセスを不透明にすることで対処されます。*注:この問題はFirefox for Androidにのみ影響します。Desktop versions of Firefox are unaffected.* (CVE-2018-12391)
- When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. (CVE-2018-12392)
- A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.* (CVE-2018-12393)
- By rewriting the Host request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. (CVE-2018-12395)
- A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. (CVE-2018-12396)
- A WebExtension can request access to local files without the warning prompt stating that the extension will 'Access your data for all websites' being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. (CVE-2018-12397)
- By using the reflected URL in some special resource URIs, such as chrome: , it is possible to inject stylesheets and bypass Content Security Policy (CSP). (CVE-2018-12398)
- When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. これにより、ユーザーは持っていないはずのプロトコルハンドラーを承認する可能性があります。
(CVE-2018-12399)
- In private browsing mode on Firefox for Android, favicons are cached in the cache/icons folder as they are in non-private mode.
これにより、プライベートブラウジングセッション中に訪問したサイトから情報が漏えいする可能性があります。*注:この問題はFirefox for Androidにのみ影響します。Desktop versions of Firefox are unaffected.* (CVE-2018-12400)
- Some special resource URIs will cause a non-exploitable crash if loaded with optional parameters following a '?' in the parsed string. これにより、サービス拒否(DoS)攻撃が引き起こされる可能性があります。
(CVE-2018-12401)
- SameSite cookies are sent on cross-origin requests when the 'Save Page As...' menu item is selected to save a page, violating cookie policy. This can result in saving the wrong version of resources based on those cookies. (CVE-2018-12402)
- If a site is loaded over a HTTPS connection but loads a favicon resource over HTTP, the mixed content warning is not displayed to users. (CVE-2018-12403)
- Mozilla developers and community members Christian Holler, Dana Keeler, Ronald Crane, Marcia Knous, Tyson Smith, Daniel Veditz, and Steve Fink reported memory safety bugs present in Firefox 62.
Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. (CVE-2018-12388)
- Mozilla developers and community members Christian Holler, Bob Owen, Boris Zbarsky, Calixte Denizet, Jason Kratzer, Jed Davis, Taegeon Lee, Philipp, Ronald Crane, Raul Gurzau, Gary Kwong, Tyson Smith, Raymond Forbes, and Bogdan Tara reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. (CVE-2018-12390)
Nessus はこれらの問題を悪用したことはありませんが、代わりにアプリケーションが自己報告するバージョン番号にのみ頼っています。
ソリューション
Mozilla Firefoxバージョン63以降にアップグレードしてください。
プラグインの詳細
ファイル名: mozilla_firefox_63_0.nasl
エージェント: windows
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus
リスク情報
ベクトル: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
ベクトル: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:U/RL:O/RC:C
脆弱性情報
CPE: cpe:/a:mozilla:firefox
必要な KB アイテム: Mozilla/Firefox/Version
エクスプロイトの容易さ: No known exploits are available
参照情報
CVE: CVE-2018-12388, CVE-2018-12390, CVE-2018-12391, CVE-2018-12392, CVE-2018-12393, CVE-2018-12395, CVE-2018-12396, CVE-2018-12397, CVE-2018-12398, CVE-2018-12399, CVE-2018-12400, CVE-2018-12401, CVE-2018-12402, CVE-2018-12403