Mozilla 发布了安全公告,以应对于 Firefox 中发现的多个漏洞。造成这些漏洞的原因包括浏览器引擎的内存安全性错误、内存损毁、缓冲区满溢、释放后使用(use-after-free)错误和Mozilla Windows Updater可以用来盖写任意档案。远程攻击者可诱使用户开启包含特制内容的网页或开启恶意软件从而引用Updater来攻击这些漏洞。
成功利用这些漏洞的攻击者可以在受影响的系统上终止程序执行、泄漏信息、提高权限、执行跨网站脚本、引致服务受阻断或执行任意程序代码。
Mozilla发行了有关产品的新版本以应对以上问题。用户可从以下网址下载:
受影响系统的用户应遵从产品供货商的建议,立即采取行动以降低风险。
https://www.mozilla.org/security/advisories/
https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox/
https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-49/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-50/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-51/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-52/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-53/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-54/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-55/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-56/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-57/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-58/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-59/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-60/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-61/
https://www.mozilla.org/firefox/47.0/releasenotes/
https://www.hkcert.org/my_url/en/alert/16060801
https://www.us-cert.gov/ncas/current-activity/2016/06/07/Mozilla-Releases-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818 (to CVE-2016-2819)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821 (to CVE-2016-2822)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2824 (to CVE-2016-2826)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828 (to CVE-2016-2829)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831 (to CVE-2016-2834)