|
|
Subscribe / Log in / New account

Arch Linux alert ASA-201602-12 (firefox)

From:  Remi Gacogne <rgacogne@archlinux.org>
To:  Discussion about security issues in Arch Linux and its packages <arch-security@archlinux.org>
Subject:  [arch-security] [ASA-201602-12] firefox: same-origin policy bypass
Date:  Sat, 13 Feb 2016 21:56:49 +0100
Message-ID:  <56BF9891.8070707@archlinux.org>

Arch Linux Security Advisory ASA-201602-12 ========================================== Severity: High Date : 2016-02-13 CVE-ID : CVE-2016-1949 Package : firefox Type : same-origin policy bypass Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The package firefox before version 44.0.2-1 is vulnerable to same-origin policy bypass. Resolution ========== Upgrade to 44.0.2-1. # pacman -Syu "firefox>=44.0.2-1" The problem has been fixed upstream in version 44.0.2. Workaround ========== None. Description =========== Jason Pang of OneSignal reported that service workers intercept responses to plugin network requests made through the browser. Plugins which make security decisions based on the content of network requests can have these decisions subverted if a service worker forges responses to those requests. For example, a forged crossdomain.xml could allow a malicious site to violate the same-origin policy using the Flash plugin. Impact ====== A remote attacker might be able to bypass the same-origin policy and gain access to sensitive information. References ========== https://www.mozilla.org/en-US/security/advisories/mfsa201... https://access.redhat.com/security/cve/CVE-2016-1949


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds