모질라 파이어폭스 58.0 보안 업데이트

꿈을꾸는 파랑새

미국 모질라 재단에서 제공을 하는 브라우저인 Firefox에서 보안 업데이트가 진행이 되었습니다. 일단 이번 파이어폭스에서는 Firefox 58로 만든 사용자 프로필은 이전 버전의 Firefox 웹 브라우저와 호환되지 않으며 Firefox를 이전 버전으로 다운 그레이드하는 옵션을 유지하려면 해당 버전에 대한 새 프로파일을 만들어야 합니다. 그리고 이번 파이어폭스 58에서는 성능 향상, 새로운 WebExtensions API 및 기타 개선 사항을 제공합니다. 일단 이번 파이어폭스 58에서는 파이어폭스 57에 비해 파이어폭스 58에서 FPS 벤치 마크를 30%까지 향상을 시켰다고 합니다. 이번 파이어폭스 확장 프로그램이 기본 또는 사용자 설정 값 중 하나를 변경하면 Firefox에서 강조 표시되며 심지어 확장 기능의 이름이 나열되어 확장 프로그램이 담당하는 확장 기능을 즉시 알 수 있으며 현재 사용 중인 기본 설정 페이지에서 즉시 확장 기능을 비활성화하는 확장 사용 안함 버튼이 생겼습니다. 그리고 변경이 된 사항은 다음과 같습니다.
Firefox 스크린 샷 향상 즉 파이어폭스 스크린 샷을 클립 보드에 직접 복사하여 붙여 넣을 수 있으며 개인 브라우징 모드에서도 작동하며 신용 카드 자동 완성 지원. preferences&privacy 아래의 Forms & Passwords에서 이 기능을 제어하며 Nepali ne-NP 로켈이 추가되었고 리눅스의 비표준 디렉터리에 설치된 글꼴의 글꼴이 있으면 빈 글꼴 문제가 해결되었으며 시만텍 인증 기관에 대한 모질라의 점진적 불신 계획 에 대해 사용자와 사이트 소유자에게 알리기 위한 경고 표시 최상위 데이터 URL 탐색을 차단합니다. 그리고 변경이 된 점은 다음과 같습니다.

점진적 웹 응용 프로그램 지원
JavaScript Startup Bytecode Cache 덕분에 성능이 향상
옵션은 미터링되지 않은 연결에서만 동기화에 추가
벵골 bn-BD와 네팔 ne-NP가 추가
폴더 지원을 통한 전체 화면 북마크 관리
FLAC 재생 지원.
테마의 상태 표시 줄 색을 변경하는 기능이 추가
홈 화면에서 Firefox 검색 위젯을 제거
안전 브라우징 프로토콜이 버전 4로 업데이트
그리고 보안업데이트 목록은 다음과 같습니다.
CVE-2018-5091: Use-after-free with DTMF timers
A use-after-free vulnerability can occur during WebRTC connections when interacting with the DTMF timers. This results in a potentially exploitable crash.
References
CVE-2018-5092: Use-after-free in Web Workers
A use-after-free vulnerability can occur when the thread for a Web Worker is freed from memory prematurely instead of from memory in the main thread while cancelling fetch operations.
References
CVE-2018-5093: Buffer overflow in WebAssembly during Memory/Table resizing
A heap buffer overflow vulnerability may occur in WebAssembly during Memory/Table resizing, resulting in a potentially exploitable crash.
CVE-2018-5094: Buffer overflow in WebAssembly with garbage collection on uninitialized memory
A heap buffer overflow vulnerability may occur in WebAssembly when shrinkElements is called followed by garbage collection on memory that is now uninitialized. This results in a potentially exploitable crash.
References
CVE-2018-5095: Integer overflow in Skia library during edge builder allocation
An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash.
References
CVE-2018-5097: Use-after-free when source document is manipulated during XSLT
A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash.
References
CVE-2018-5098: Use-after-free while manipulating form input elements
A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash.
References
CVE-2018-5099: Use-after-free with widget listener
A use-after-free vulnerability can occur when the widget listener is holding strong references to browser objects that have previously been freed, resulting in a potentially exploitable crash when these references are used.
References
CVE-2018-5100: Use-after-free when IsPotentiallyScrollable arguments are freed from memory
A use-after-free vulnerability can occur when arguments passed to the IsPotentiallyScrollable function are freed while still in use by scripts. This results in a potentially exploitable crash.
References
CVE-2018-5101: Use-after-free with floating first-letter style elements
A use-after-free vulnerability can occur when manipulating floating first-letter style elements, resulting in a potentially exploitable crash.
References
CVE-2018-5102: Use-after-free in HTML media elements
A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash.
References
CVE-2018-5103: Use-after-free during mouse event handling
A use-after-free vulnerability can occur during mouse event handling due to issues with multiprocess support. This results in a potentially exploitable crash.
References
CVE-2018-5104: Use-after-free during font face manipulation
A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash.
References
CVE-2018-5105: WebExtensions can save and execute files on local file system without user prompts
WebExtensions can bypass user prompts to first save and then open an arbitrarily downloaded file. This can result in an executable file running with local user privileges without explicit user consent.
References
CVE-2018-5106: Developer Tools can expose style editor information cross-origin through service worker
Style editor traffic in the Developer Tools can be routed through a service worker hosted on a third party website if a user selects error links when these tools are open. This can allow style editor information used within Developer Tools to leak cross-origin.
References
CVE-2018-5107: Printing process will follow symlinks for local file access
The printing process can bypass local access protections to read files available through symlinks, bypassing local file restrictions. The printing process requires files in a specific format so arbitrary data cannot be read but it is possible that some local file information could be exposed.
References
CVE-2018-5108: Manually entered blob URL can be accessed by subsequent private browsing tabs
A Blob URL can violate origin attribute segregation, allowing it to be accessed from a private browsing tab and for data to be passed between the private browsing tab and a normal tab. This could allow for the leaking of private information specific to the private browsing context. This issue is mitigated by the requirement that the user enter the Blob URL manually in order for the access violation to occur.
References
CVE-2018-5109: Audio capture prompts and starts with incorrect origin attribution
An audio capture session can started under an incorrect origin from the site making the capture request. Users are still prompted to allow the request but the prompt can display the wrong origin, leading to user confusion about which site is making the request to capture an audio stream.
References
CVE-2018-5110: Cursor can be made invisible on OS X
If cursor visibility is toggled by script using from 'none' to an image and back through script, the cursor will be rendered temporarily invisible within Firefox.
Note: This vulnerability only affects OS X. Other operating systems are not affected.
References
CVE-2018-5111: URL spoofing in addressbar through drag and drop
When the text of a specially formatted URL is dragged to the addressbar from page content, the displayed URL can be spoofed to show a different site than the one loaded. This allows for phishing attacks where a malicious page can spoof the identify of another site.
References
CVE-2018-5112: Extension development tools panel can open a non-relative URL in the panel
Development Tools panels of an extension are required to load URLs for the panels as relative URLs from the extension manifest file but this requirement was not enforced in all instances. This could allow the development tools panel for the extension to load a URL that it should not be able to access, including potentially privileged pages.
References
CVE-2018-5113: WebExtensions can load non-HTTPS pages with browser.identity.launchWebAuthFlow
The browser.identity.launchWebAuthFlow function of WebExtensions is only allowed to load content over https: but this requirement was not properly enforced. This can potentially allow privileged pages to be loaded by the extension.
References
CVE-2018-5114: The old value of a cookie changed to HttpOnly remains accessible to scripts
If an existing cookie is changed to be HttpOnly while a document is open, the original value remains accessible through script until that document is closed. Network requests correctly use the changed HttpOnly cookie.
References
CVE-2018-5115: Background network requests can open HTTP authentication in unrelated foreground tabs
If an HTTP authentication prompt is triggered by a background network request from a page or extension, it is displayed over the currently loaded foreground page. Although the prompt contains the real domain making the request, this can result in user confusion about the originating site of the authentication request and may cause users to mistakenly send private credential information to a third party site.
References
CVE-2018-5116: WebExtension ActiveTab permission allows cross-origin frame content access
WebExtensions with the ActiveTab permission are able to access frames hosted within the active tab even if the frames are cross-origin. Malicious extensions can inject frames from arbitrary origins into the loaded page and then interact with them, bypassing same-origin user expectations with this permission.
References
CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right
If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in some circumstances to scroll this text to spoof the displayed URL. This issue could result in the wrong URL being displayed as a location, which can mislead users to believe they are on a different site than the one loaded.
References
CVE-2018-5118: Activity Stream images can attempt to load local content through file
The screenshot images displayed in the Activity Stream page displayed when a new tab is opened is created from the meta tags of websites. An issue was discovered where the page could attempt to create these images through file: URLs from the local file system. This loading is blocked by the sandbox but could expose local data if combined with another attack that escapes sandbox protections.
References
CVE-2018-5119: Reader view will load cross-origin content in violation of CORS headers
The reader view will display cross-origin content when CORS headers are set to prohibit the loading of cross-origin content by a site. This could allow access to content that should be restricted in reader view.
References
CVE-2018-5121: OS X Tibetan characters render incompletely in the addressbar
Low descenders on some Tibetan characters in several fonts on OS X are clipped when rendered in the addressbar. When used as part of an Internationalized Domain Name (IDN) this can be used for domain name spoofing attacks.
Note: This attack only affects OS X operating systems. Other operating systems are unaffected.
References
CVE-2018-5122: Potential integer overflow in DoCrypt
A potential integer overflow in the DoCrypt function of WebCrypto was identified. If a means was found of exploiting it, it could result in an out-of-bounds write.
References
CVE-2018-5090: Memory safety bugs fixed in Firefox 58
Mozilla developers and community members Calixte Denizet, Christian Holler, Alex Gaynor, Yoshi Huang, Bob Clary, Nils Ohlmeier, Jason Kratzer, Jesse Ruderman, Philipp, Mike Taylor, Marcia Knous, Paul Adenot, Randell Jesup, JW Wang, Tyson Smith, Emilio Cobos Álvarez, Ted Campbell, Stephen Fewer, and Tristan Bourvon reported memory safety bugs present in Firefox 57. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
Memory safety bugs fixed in Firefox 58
CVE-2018-5089: Memory safety bugs fixed in Firefox 58 and Firefox ESR 52.6
Mozilla developers and community members Christian Holler, Jason Kratzer, Marcia Knous, Nathan Froyd, Oriol Brufau, Ronald Crane, Randell Jesup, Tyson Smith, Emilio Cobos Álvarez, Ryan VanderMeulen, Sebastian Hengst, Karl Tomlinson, Xidorn Quan, Ludovic Hirlimann, and Jason Orendorff reported memory safety bugs present in Firefox 57 and Firefox ESR 52.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
References
Memory safety bugs fixed in Firefox 58 and Firefox ESR 52.6
일단 파이어폭스를 사용하고 계시는 분들은 반드시 보안 갱신을 해서 안전하게 컴퓨터를 사용하시는 것이 좋을 것 같습니다.

이 글을 공유합시다

facebook twitter googleplus kakaostory naver

본문과 관련 있는 내용으로 댓글을 남겨주시면 감사하겠습니다.

  1. Favicon of https://bubleprice.net 버블프라이스 2018.01.25 07:09 신고

    화이어폭스는 보조용으로 사용하고 있는 브라우저인데요~
    보안업데이트가 나왔군요? 바로 업뎃 하러 가야겠어요^^

    • Favicon of https://wezard4u.tistory.com Sakai 2018.01.25 16:51 신고

      네~보안 업데이트가 나오면 보안 업데이트를 하는것도 좋은 방법이죠.

  2. Favicon of https://jongamk.tistory.com 핑구야 날자 2018.01.25 07:09 신고

    원 업데이트가 되고 있군요 파폭 사용하는 분들은 확인해봐야겠어요

  3. Favicon of https://rdsong.com 알송달송IT세상 2018.01.27 21:57 신고

    업데이트 내용 잘 봤습니다 갠적으로 귀차니즘에 포스팅 전 냅뒀습니다 :)