{"id":18444,"date":"2022-03-07T13:10:04","date_gmt":"2022-03-07T21:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/03\/07\/news-12177\/"},"modified":"2022-03-07T13:10:04","modified_gmt":"2022-03-07T21:10:04","slug":"news-12177","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/07\/news-12177\/","title":{"rendered":"Update now! Mozilla patches two actively exploited vulnerabilities"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Mon, 07 Mar 2022 20:25:18 +0000<\/strong><\/p>\n<p>Mozilla has <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2022-09\/\" target=\"_blank\" rel=\"noreferrer noopener\">announced<\/a> it has fixed security vulnerabilities in Firefox 97.0.2, Firefox ESR 91.6.1, Firefox for Android 97.3.0, and Focus 97.3.0. Users should install the out-of-band security update as soon as possible, since it is designed to apply a fix for two vulnerabilities that are known to be exploited in the wild.<\/p>\n<p>Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services). These are the CVEs you need to know:<\/p>\n<h2>CVE-2022-26485<\/h2>\n<p>The vulnerability listed under <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-26485\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-26485<\/a> can be triggered by removing an XSLT parameter during processing which could lead to an exploitable use-after-free.<\/p>\n<p>In the Extensible Markup Language (XML) the &lt;xsl:param&gt; element is used to declare a local or global parameter. XML is a markup language much like HTML and XML was designed to store and transport data. The XSLT <em>&lt;xsl:param&gt;<\/em> and <em>&lt;xsl:with-param&gt;<\/em> elements allow you to pass parameters to a template.<\/p>\n<p>Use-after-free (UAF) is a vulnerability caused by incorrect use of dynamic memory during a program\u2019s operation. If after freeing a memory location, a program does not clear the pointer to that memory, an attacker can use the error to manipulate the program.<\/p>\n<h2>CVE-2022-26486<\/h2>\n<p>The vulnerability listed under <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-26486\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-26486<\/a> can be exploited by sending an unexpected message in the WebGPU IPC framework which in turn could lead to a use-after-free and exploitable sandbox escape.<\/p>\n<p>WebGPU exposes an API for performing operations, such as rendering and computation, on a Graphics Processing Unit. Interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data. WebGPU sees physical Graphics Processing Units (GPUs) hardware as GPUAdapters. It provides a connection which manages resources, and the device\u2019s GPUQueues, which execute commands.<\/p>\n<p>The idea of browser sandboxes is to shield the system from the malware attacking the browser. They do this by containing any malicious code that originates from visiting a website, in the sandbox part of the browser. As soon as the sandbox is closed, everything inside it is erased, including the malicious code.<\/p>\n<p>So, the ability to escape the&nbsp;application\u2019s security sandbox is valuable to an attacker as it can be chained with other vulnerabilities to take over the target system. Since these two vulnerabilities were reported by the same researchers, it seems highly likely they were used together in online attacks for exactly that purpose.<\/p>\n<h2>Critical<\/h2>\n<p>These vulnerabilities are rated critical and that is very likely because they are being exploited in the wild. From the descriptions, we would deduce that these bugs are critical because they could allow a remote attacker to execute almost any command, including the downloading of malware to provide further access to the device. So, there are compelling reasons to apply this update as soon as possible<\/p>\n<h2>Mitigation<\/h2>\n<p>The affected Mozilla products need to be updated to the versions listed below.<\/p>\n<ul>\n<li>Firefox 97.0.2<\/li>\n<li>Firefox ESR 91.6.1<\/li>\n<li>Firefox for Android 97.3<\/li>\n<li>Focus 97.3<\/li>\n<li>Thunderbird 91.6.2<\/li>\n<\/ul>\n<p>Under normal circumstances, updates will be applied without user intervention. You can check for the version number in the products\u2019 menu under <strong>Help<\/strong> &gt; <strong>About<\/strong><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"54952\" data-permalink=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/03\/update-now-mozilla-patches-two-actively-exploited-vulnerabilities\/attachment\/uptodate-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/uptodate.png\" data-orig-size=\"673,368\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"uptodate\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/uptodate-300x164.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/uptodate-600x328.png\" loading=\"lazy\" width=\"600\" height=\"328\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/uptodate-600x328.png\" alt=\"Firefox Browser up to date\" class=\"wp-image-54952\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/uptodate-600x328.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/uptodate-300x164.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/uptodate.png 673w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n<p>Should you not be using the latest version for some reason, e.g. automatic updates are disabled, then this screen will inform you that a new version is available and will start downloading it.<\/p>\n<p>When it\u2019s done, all you need to do is restart the application to apply the update.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"54953\" data-permalink=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/03\/update-now-mozilla-patches-two-actively-exploited-vulnerabilities\/attachment\/restart_to_update\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/restart_to_update.png\" data-orig-size=\"686,375\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"restart_to_update\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/restart_to_update-300x164.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/restart_to_update-600x328.png\" loading=\"lazy\" width=\"600\" height=\"328\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/restart_to_update-600x328.png\" alt=\"restart to update\" class=\"wp-image-54953\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/restart_to_update-600x328.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/restart_to_update-300x164.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/restart_to_update.png 686w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption>restart to update<\/figcaption><\/figure>\n<\/div>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/03\/update-now-mozilla-patches-two-actively-exploited-vulnerabilities\/\">Update now! Mozilla patches two actively exploited vulnerabilities<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/03\/update-now-mozilla-patches-two-actively-exploited-vulnerabilities\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Mon, 07 Mar 2022 20:25:18 +0000<\/strong><\/p>\n<p>Mozilla has issued an out of bound update for Firefox and Thunderbird to fix two vulnerabilities being exploited in the wild.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/03\/update-now-mozilla-patches-two-actively-exploited-vulnerabilities\/\">Update now! Mozilla patches two actively exploited vulnerabilities<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[25245,25246,25247,22783,11122,23796,13271,15931,25248,13072,25249],"class_list":["post-18444","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cve-2022-26485","tag-cve-2022-26486","tag-escape-sandbox","tag-exploits-and-vulnerabilities","tag-firefox","tag-ipc","tag-mozilla","tag-thunderbird","tag-webgpu","tag-xml","tag-xslt"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18444"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18444\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18444"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}