Mozilla 發布了安全公告,以應對於 Firefox 中發現的多個漏洞。造成這些漏洞的原因包括瀏覽器引擎的記憶體安全性錯誤、記憶體損毀、緩衝區滿溢、釋放後使用(use-after-free)錯誤和Mozilla Windows Updater可以用來蓋寫任意檔案。遠端攻擊者可誘使用戶開啓包含特製內容的網頁或開啟惡意程式從而引用Updater來攻擊這些漏洞。
成功利用這些漏洞的攻擊者可以在受影響的系統上終止程式執行、洩漏資訊、提高權限、執行跨網站指令碼、引致服務受阻斷或執行任意程式碼。
Mozilla發行了有關產品的新版本以應對以上問題。用戶可從以下網址下載:
受影響系統的用戶應遵從產品供應商的建議,立即採取行動以降低風險。
https://www.mozilla.org/security/advisories/
https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox/
https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-49/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-50/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-51/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-52/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-53/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-54/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-55/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-56/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-57/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-58/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-59/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-60/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-61/
https://www.mozilla.org/firefox/47.0/releasenotes/
https://www.hkcert.org/my_url/en/alert/16060801
https://www.us-cert.gov/ncas/current-activity/2016/06/07/Mozilla-Releases-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818 (to CVE-2016-2819)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821 (to CVE-2016-2822)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2824 (to CVE-2016-2826)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828 (to CVE-2016-2829)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831 (to CVE-2016-2834)