vendor:
Firefox
by:
Rh0
9.8
CVSS
CRITICAL
Full ASLR and DEP Bypass
119
CWE
Product Name: Firefox
Affected Version From: Firefox 46.0.1
Affected Version To:
Patch Exists: YES
Related CWE: CVE-2016-2819, CVE-2017-5375
CPE: a:mozilla:firefox:46.0.1
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2016-2819/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2016-2819/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-2819/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-2819/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-2819/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2016-2819/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2016-2819/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2016-2819/, https://www.rapid7.com/db/vulnerabilities/mfsa2016-50-cve-2016-2819/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2013-7239/, https://www.rapid7.com/db/vulnerabilities/mfsa2017-01-cve-2017-5375/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2017-5375/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2017-5375/, https://www.rapid7.com/db/vulnerabilities/ubuntu-usn-3175-2/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2017-5375/, https://www.rapid7.com/db/vulnerabilities/mozilla-thunderbird-cve-2017-5375/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2017-5375/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2017-5375/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2017-5375/, https://www.rapid7.com/db/vulnerabilities/mfsa2017-02-cve-2017-5375/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2017-5375/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2017-5375/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2017-5375/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2017-5375/
Platforms Tested: Windows 10 1709
2018
CVE-2016-2819 and ASM.JS JIT-Spray
This is a Proof of Concept exploit against Firefox 46.0.1 that bypasses full ASLR and DEP using ASM.JS JIT spray. It targets a specific address of a fake node object and an ASM.JS float pool payload. By spraying ASM.JS float constant pools and fake Node objects, it triggers a vulnerability in the browser and allows the execution of arbitrary code.
Mitigation:
Update to a version of Firefox that includes a fix for the vulnerability.