USN-2743-3

Source
https://ubuntu.com/security/notices/USN-2743-3
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2743-3.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2743-3
Related
Published
2015-09-24T16:31:43Z
Modified
2026-02-10T04:40:55Z
Summary
unity-firefox-extension, webapps-greasemonkey, webaccounts-browser-extension update
Details

USN-2743-1 fixed vulnerabilities in Firefox. Future Firefox updates will require all addons be signed and unity-firefox-extension, webapps-greasemonkey and webaccounts-browser-extension will not go through the signing process. Because these addons currently break search engine installations (LP:

1069793), this update permanently disables the addons by removing them from

the system.

We apologize for any inconvenience.

Original advisory details:

Andrew Osmond, Olli Pettay, Andrew Sutherland, Christian Holler, David Major, Andrew McCreight, Cameron McCormack, Bob Clary and Randell Jesup discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4500, CVE-2015-4501)

André Bargull discovered that when a web page creates a scripted proxy for the window with a handler defined a certain way, a reference to the inner window will be passed, rather than that of the outer window. (CVE-2015-4502)

Felix Gröbert discovered an out-of-bounds read in the QCMS color management library in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or obtain sensitive information. (CVE-2015-4504)

Khalil Zhani discovered a buffer overflow when parsing VP9 content in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4506)

Spandan Veggalam discovered a crash while using the debugger API in some circumstances. If a user were tricked in to opening a specially crafted website whilst using the debugger, an attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4507)

Juho Nurminen discovered that the URL bar could display the wrong URL in reader mode in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to conduct URL spoofing attacks. (CVE-2015-4508)

A use-after-free was discovered when manipulating HTML media content in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4509)

Looben Yang discovered a use-after-free when using a shared worker with IndexedDB in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4510)

Francisco Alonso discovered an out-of-bounds read during 2D canvas rendering in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information. (CVE-2015-4512)

Jeff Walden discovered that changes could be made to immutable properties in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to execute arbitrary script in a privileged scope. (CVE-2015-4516)

Ronald Crane reported multiple vulnerabilities. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180)

Mario Gomes discovered that dragging and dropping an image after a redirect exposes the redirected URL to scripts. An attacker could potentially exploit this to obtain sensitive information. (CVE-2015-4519)

Ehsan Akhgari discovered 2 issues with CORS preflight requests. An attacker could potentially exploit these to bypass CORS restrictions. (CVE-2015-4520)

References

Affected packages

Ubuntu:14.04:LTS / unity-firefox-extension

Package

Name
unity-firefox-extension
Purl
pkg:deb/ubuntu/unity-firefox-extension@3.0.0+14.04.20140416-0ubuntu1.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.0+14.04.20140416-0ubuntu1.14.04.1

Affected versions

2.*
2.4.8+13.10.20130920-0ubuntu1
3.*
3.0.0+14.04.20140130.1-0ubuntu1
3.0.0+14.04.20140205-0ubuntu1
3.0.0+14.04.20140220-0ubuntu1
3.0.0+14.04.20140411-0ubuntu1
3.0.0+14.04.20140416-0ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libufe-xidgetter0",
            "binary_version": "3.0.0+14.04.20140416-0ubuntu1.14.04.1"
        },
        {
            "binary_name": "xul-ext-unity",
            "binary_version": "3.0.0+14.04.20140416-0ubuntu1.14.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2743-3.json"
cves_map
{
    "ecosystem": "Ubuntu:14.04:LTS",
    "cves": []
}

Ubuntu:14.04:LTS / webaccounts-browser-extension

Package

Name
webaccounts-browser-extension
Purl
pkg:deb/ubuntu/webaccounts-browser-extension@0.5-0ubuntu2.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5-0ubuntu2.14.04.1

Affected versions

0.*
0.5-0ubuntu1
0.5-0ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "webaccounts-chromium-extension",
            "binary_version": "0.5-0ubuntu2.14.04.1"
        },
        {
            "binary_name": "webaccounts-extension-common",
            "binary_version": "0.5-0ubuntu2.14.04.1"
        },
        {
            "binary_name": "xul-ext-webaccounts",
            "binary_version": "0.5-0ubuntu2.14.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2743-3.json"
cves_map
{
    "ecosystem": "Ubuntu:14.04:LTS",
    "cves": []
}

Ubuntu:14.04:LTS / webapps-greasemonkey

Package

Name
webapps-greasemonkey
Purl
pkg:deb/ubuntu/webapps-greasemonkey@2.3.6+13.10.20130920.1-0ubuntu1.2?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.6+13.10.20130920.1-0ubuntu1.2

Affected versions

2.*
2.3.6+13.10.20130920.1-0ubuntu1
2.3.6+13.10.20130920.1-0ubuntu1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xul-ext-websites-integration",
            "binary_version": "2.3.6+13.10.20130920.1-0ubuntu1.2"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2743-3.json"
cves_map
{
    "ecosystem": "Ubuntu:14.04:LTS",
    "cves": []
}