The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability note CVE-2015-4473 CVE-2015-4474 CVE-2015-4475

Firefox, Thunderbird: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Firefox/Thunderbird.
Impacted products: Debian, Fedora, Firefox, SeaMonkey, Thunderbird, openSUSE, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 4/4.
Creation date: 12/08/2015.
Identifiers: 1185820, bulletinoct2016, CERTFR-2015-AVI-349, CVE-2015-4473, CVE-2015-4474, CVE-2015-4475, CVE-2015-4477, CVE-2015-4478, CVE-2015-4479, CVE-2015-4480, CVE-2015-4481, CVE-2015-4482, CVE-2015-4483, CVE-2015-4484, CVE-2015-4485, CVE-2015-4486, CVE-2015-4487, CVE-2015-4488, CVE-2015-4489, CVE-2015-4490, CVE-2015-4491, CVE-2015-4492, CVE-2015-4493, DSA-3333-1, DSA-3410-1, FEDORA-2015-012399857d, FEDORA-2015-13397, FEDORA-2015-13436, FEDORA-2015-29dfba02ca, MFSA-2015-79, MFSA-2015-80, MFSA-2015-81, MFSA-2015-82, MFSA-2015-83, MFSA-2015-84, MFSA-2015-85, MFSA-2015-86, MFSA-2015-87, MFSA-2015-88, MFSA-2015-89, MFSA-2015-90, MFSA-2015-91, MFSA-2015-92, openSUSE-SU-2015:1389-1, openSUSE-SU-2015:1390-1, openSUSE-SU-2015:1453-1, openSUSE-SU-2015:1454-1, RHSA-2015:1586-01, RHSA-2015:1682-01, SSA:2015-226-01, SSA:2015-226-02, SUSE-SU-2015:1379-1, SUSE-SU-2015:1380-1, SUSE-SU-2015:1449-1, SUSE-SU-2015:1476-1, SUSE-SU-2015:1528-1, SUSE-SU-2015:2081-1, USN-2702-1, USN-2702-2, USN-2702-3, USN-2712-1, VIGILANCE-VUL-17644, ZDI-15-456.

Description of the vulnerability

Several vulnerabilities were announced in Firefox/Thunderbird.

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-4473, CVE-2015-4474, MFSA-2015-79]

An attacker can force a read at an invalid address with MP3, in order to trigger a denial of service. [severity:3/4; CVE-2015-4475, MFSA-2015-80]

An attacker can force the usage of a freed memory area in MediaStream, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-4477, MFSA-2015-81]

An attacker can bypass security features in JavaScript, in order to escalate his privileges. [severity:3/4; CVE-2015-4478, MFSA-2015-82]

An attacker can generate a buffer overflow in libstagefright, in order to trigger a denial of service, and possibly to run code. These vulnerabilities are similar to those of VIGILANCE-VUL-17512. [severity:4/4; CVE-2015-4479, CVE-2015-4480, CVE-2015-4493, MFSA-2015-83, ZDI-15-456]

An attacker can use Mozilla Maintenance Service, in order to overwrite a file. [severity:3/4; CVE-2015-4481, MFSA-2015-84]

An attacker can generate a buffer overflow in Updater MAR File, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2015-4482, MFSA-2015-85]

An attacker can bypass security features with a POST "feed:", in order to escalate his privileges. [severity:1/4; CVE-2015-4483, MFSA-2015-86]

An attacker can trigger a fatal error in JavaScript Shared Memory, in order to trigger a denial of service. [severity:2/4; CVE-2015-4484, MFSA-2015-87]

An attacker can generate a buffer overflow in gdk-pixbuf, in order to trigger a denial of service, and possibly to run code (VIGILANCE-VUL-17706). [severity:3/4; CVE-2015-4491, MFSA-2015-88]

An attacker can generate a buffer overflow in Libvpx, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-4485, CVE-2015-4486, MFSA-2015-89]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2015-4487, CVE-2015-4488, CVE-2015-4489, MFSA-2015-90]

An attacker can bypass security features in CSP Specification, in order to escalate his privileges. [severity:2/4; CVE-2015-4490, MFSA-2015-91]

An attacker can force the usage of a freed memory area in XMLHttpRequest, in order to trigger a denial of service, and possibly to run code. [severity:3/4; 1185820, CVE-2015-4492, MFSA-2015-92]
Complete Vigil@nce bulletin.... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides an application vulnerability patch. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The technology watch team tracks security threats targeting the computer system. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.