Published on: 20 April 2017
Last update on: 20 April 2017
Mozilla has published security advisories to address multiple vulnerabilities found in Firefox. These vulnerabilities are caused by buffer overflow, memory safety bugs, origin confusion, out-of-bounds read and write, use-after-free error, etc. A remote attacker could entice a user to open a web page with specially crafted content to exploit the vulnerabilities.
A successful attack could lead to allow cross-site scripting, denial of service, arbitrary code execution, security restriction bypass, spoofing or application crash on an affected system.
Mozilla has released new versions of the product to address the issues and they can be downloaded at the following URLs:
Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://www.mozilla.org/security/advisories/
https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox/
https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/
https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
https://www.hkcert.org/my_url/en/alert/17042002
https://www.us-cert.gov/ncas/current-activity/2017/04/19/Mozilla-Releases-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429 (to CVE-2017-5430)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432 (to CVE-2017-5456)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5458 (to CVE-2017-5469)