Mozilla has released a new version of its web browser. Firefox 36 continues the process of migration from 1024 RSA Keys, patches more than 16 vulnerabilities and also integrates security fixes from all security levels. As a result from the new version of Firefox, the developer managed to deal with two less significant flaws, with six vulnerabilities of moderate risk and with six high severity vulnerabilities.
The Critical Vulnerabilities
The new version patches more than 16 vulnerabilities, where three of them are of a higher risk in case exploited properly. In one of the cases the entry got as many as ten memory safety bugs. These memory-related bugs were discovered by Mozilla developers and the community members who also contributed to the fixing of the problem.
Paul Bandha, a security researcher, reported vulnerability in the browser that could lead to a potentially exploitable crash. That crash could be triggered once the user runs a specific web content through the interface of IndexedDB to create an index.
The buffer overflow is another critical vulnerability from the repairs list of Firefox 36. It was triggered in the library after playing an MP4 video that is not valid. The result is allocation of the insufficiently large content buffer, leading to a crash that could be exploited by the attacker.
Very High Security Risks
The vulnerabilities that have less damaging potential hide in themselves one that allows the attacker to extract information about the user from a readable file that is stored in a known local path. That exploit turned possible with user interaction by manipulation of the auto-complete feature. In that way the local file remains invisible, however its content is delivered though the Document Object Model.
The web browser update component, as revealed by a security researcher, loaded DLL files from the Windows temporary directories (Linux and OS X – not affected) or from the local working folder, and also from posing a malicious file.
The developers of Mozilla also made efforts in removing an out-of-bounds write that is occurring when a SVG image file that is improperly formatted is rendered, as that would allow the potential attacker to get access to and to read the uninitialized memory.
The security researchers discovered yet another flaw – a buffer underflow condition, which is created when a badly formatted MP3 audio file is played. If the glitch is successfully exploited, this permits parts of the Firefox memory to be integrated into an MP3 stream, which is accessible to scripts on a malicious page.
Users should be aware that the full list of security glitches that are repaired by the new version Firefox 36 can be found on the security advisory page of Mozilla browser.