Bug 925395 (CVE-2015-0816)

Summary: VUL-0: CVE-2015-0816: MozillaFirefox,MozillaThunderbird: resource:// documents can load privileged pages (MFSA 2015-33)
Product: [Novell Products] SUSE Security Incidents Reporter: Andreas Stieger <astieger>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED DUPLICATE QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: smash_bz, wolfgang
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/115391/
Whiteboard: maint:running:61408:moderate
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on:    
Bug Blocks: 925368    

Description Andreas Stieger 2015-04-01 10:32:51 UTC
resource:// documents can load privileged pages

Announced:     March 31, 2015
Reporter:     Mariusz Mlynski
Impact:     Moderate
Products:     Firefox, Firefox ESR, Thunderbird
Fixed in: 
        Firefox 37
        Firefox ESR 31.6
        Thunderbird 31.6

Description

Security researcher Mariusz Mlynski reported, through HP Zero Day Initiative's Pwn2Own contest, that documents loaded though a resource: URL, such as Mozilla's PDF.js PDF file viewer, were able to subsequently load privileged chrome pages. The privilege restrictions on resource: URLs was handled incorrectly and these restrictions could be bypassed if this flaw was combined with a separate vulnerability allowing for same-origin policy violation, it could be used to run arbitrary code.

In general this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled, but is potentially a risk in browser or browser-like contexts.


References:
https://www.mozilla.org/en-US/security/advisories/mfsa2015-33/
https://bugzilla.mozilla.org/show_bug.cgi?id=1144991
https://bugzilla.redhat.com/show_bug.cgi?id=1207072
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0816
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
Comment 1 Swamp Workflow Management 2015-04-01 13:07:18 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2015-04-15.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/61408
Comment 2 Swamp Workflow Management 2015-04-01 22:01:06 UTC
bugbot adjusting priority
Comment 4 Andreas Stieger 2015-04-02 08:43:55 UTC
merge into parent

*** This bug has been marked as a duplicate of bug 925368 ***
Comment 5 Swamp Workflow Management 2015-04-08 09:05:41 UTC
openSUSE-SU-2015:0677-1: An update that fixes 15 vulnerabilities is now available.

Category: security (important)
Bug References: 925368,925392,925393,925394,925395,925396,925397,925398,925399,925400,925401,925402,926166
CVE References: CVE-2015-0799,CVE-2015-0801,CVE-2015-0802,CVE-2015-0803,CVE-2015-0804,CVE-2015-0805,CVE-2015-0806,CVE-2015-0807,CVE-2015-0808,CVE-2015-0811,CVE-2015-0812,CVE-2015-0813,CVE-2015-0814,CVE-2015-0815,CVE-2015-0816
Sources used:
openSUSE 13.2 (src):    MozillaFirefox-37.0.1-23.1, MozillaThunderbird-31.6.0-15.3, mozilla-nspr-4.10.8-6.1
openSUSE 13.1 (src):    MozillaFirefox-37.0.1-68.1, MozillaThunderbird-31.6.0-70.50.2, mozilla-nspr-4.10.8-22.1