TencentOS Server 4: firefox (TSSA-2024:0159)

high Nessus Plugin ID 239048

Synopsis

The remote TencentOS Server 4 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 4 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2024:0159 advisory.

Package updates are available for TencentOS Server 4 that fix the following vulnerabilities:

CVE-2023-5732:
An attacker could have created a malicious link using bidirectional characters to spoof the location in the address bar when visited. This vulnerability affects Firefox ESR < 115.4.
The Mozilla Foundation Security Advisory describes this flaw as:
An attacker could have created a malicious link using bidirectional characters to spoof the location in the address bar when visited.

CVE-2023-5728:
During garbage collection extra operations were performed on a object that should not be. This could have led to a potentially exploitable crash. This vulnerability affects Firefox < 119 and Firefox ESR < 115.4.
The Mozilla Foundation Security Advisory describes this flaw as:
During garbage collection extra operations were performed on a object that should not be. This could have led to a potentially exploitable crash.

CVE-2023-5725:
A malicious installed WebExtension could open arbitrary URLs, which under the right circumstance could be leveraged to collect sensitive user data. This vulnerability affects Firefox < 119 and Firefox ESR < 115.4.
The Mozilla Foundation Security Advisory describes this flaw as:
A malicious installed WebExtension could open arbitrary URLs, which under the right circumstance could be leveraged to collect sensitive user data.

CVE-2023-5724:
Drivers are not always robust to extremely large draw calls and in some cases this scenario could have led to a crash. This vulnerability affects Firefox < 119 and Firefox ESR < 115.4.
The Mozilla Foundation Security Advisory describes this flaw as:
Drivers are not always robust to extremely large draw calls and in some cases this scenario could have led to a crash.

CVE-2023-5721:
It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an insufficient activation-delay. This vulnerability affects Firefox < 119 and Firefox ESR < 115.4.
The Mozilla Foundation Security Advisory describes this flaw as:
It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an insufficient activation-delay.

CVE-2023-5217:
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVE-2023-4863:
Heap buffer overflow in WebP in Google Chrome prior to 116.0.5845.187 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

CVE-2023-4585:
Memory safety bugs present in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVE-2023-4584:
Memory safety bugs present in Firefox 116, Firefox ESR 102.14, Firefox ESR 115.1, Thunderbird 102.14, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, Thunderbird < 102.15, and Thunderbird < 115.2.

CVE-2023-4583:
When checking if the Browsing Context had been discarded in `HttpBaseChannel`, if the load group was not available then it was assumed to have already been discarded which was not always the case for private channels after the private session had ended. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVE-2023-4581:
Excel `.xll` add-in files did not have a blocklist entry in Firefox's executable blocklist which allowed them to be downloaded without any warning of their potential harm. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, Thunderbird < 102.15, and Thunderbird < 115.2.

CVE-2023-4580:
Push notifications stored on disk in private browsing mode were not being encrypted potentially allowing the leak of sensitive information. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVE-2023-4578:
When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVE-2023-4575:
When creating a callback over IPC for showing the File Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVE-2023-4574:
When creating a callback over IPC for showing the Color Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVE-2023-4573:
When receiving rendering data over IPC `mStream` could have been destroyed when initialized, which could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVE-2023-44488:
VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.

CVE-2023-4057:
Memory safety bugs present in Firefox 115, Firefox ESR 115.0, and Thunderbird 115.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 116, Firefox ESR < 115.1, and Thunderbird < 115.1.

CVE-2023-4056:
Memory safety bugs present in Firefox 115, Firefox ESR 115.0, Firefox ESR 102.13, Thunderbird 115.0, and Thunderbird 102.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVE-2023-4055:
When the number of cookies per domain was exceeded in `document.cookie`, the actual cookie jar sent to the host was no longer consistent with expected cookie jar state. This could have caused requests to be sent with some cookies missing. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVE-2023-4053:
A website could have obscured the full screen notification by using a URL with a scheme handled by an external program, such as a mailto URL. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 116, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVE-2023-4051:
A website could have obscured the full screen notification by using the file open dialog. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 116, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVE-2023-4050:
In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVE-2023-4049:
Race conditions in reference counting code were found through code inspection. These could have resulted in potentially exploitable use-after-free vulnerabilities. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVE-2023-4048:
An out-of-bounds read could have led to an exploitable crash when parsing HTML with DOMParser in low memory situations. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVE-2023-4047:
A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVE-2023-4046:
In some circumstances, a stale value could have been used for a global variable in WASM JIT analysis. This resulted in incorrect compilation and a potentially exploitable crash in the content process. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVE-2023-4045:
Offscreen Canvas did not properly track cross-origin tainting, which could have been used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVE-2023-37211:
Memory safety bugs present in Firefox 114, Firefox ESR 102.12, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13.

CVE-2023-37208:
When opening Diagcab files, Firefox did not warn the user that these files may contain malicious code.
This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13.

CVE-2023-37207:
A website could have obscured the fullscreen notification by using a URL with a scheme handled by an external program, such as a mailto URL. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13.

CVE-2023-37202:
Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free. This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13.

CVE-2023-37201:
An attacker could have triggered a use-after-free condition when creating a WebRTC connection over HTTPS.
This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13.

CVE-2023-34416:
Memory safety bugs present in Firefox 113, Firefox ESR 102.11, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.12, Firefox < 114, and Thunderbird < 102.12.

CVE-2023-34414:
The error page for sites with invalid TLS certificates was missing the activation-delay Firefox uses to protect prompts and permission dialogs from attacks that exploit human response time delays. If a malicious page elicited user clicks in precise locations immediately before navigating to a site with a certificate error and made the renderer extremely busy at the same time, it could create a gap between when the error page was loaded and when the display actually refreshed.
With the right timing the elicited clicks could land in that gap and activate the button that overrides the certificate error for that site. This vulnerability affects Firefox ESR < 102.12, Firefox < 114, and Thunderbird < 102.12.

CVE-2023-32215:
Mozilla developers and community members Gabriele Svelto, Andrew Osmond, Emily McDonough, Sebastian Hengst, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.

CVE-2023-32213:
When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.

CVE-2023-32212:
An attacker could have positioned a <code>datalist</code> element to obscure the address bar. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.

CVE-2023-32211:
A type checking bug would have led to invalid code being compiled. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.

CVE-2023-32207:
A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.

CVE-2023-32206:
An out-of-bound read could have led to a crash in the RLBox Expat driver. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.

CVE-2023-32205:
In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.

CVE-2023-29550:
Mozilla developers Randell Jesup, Andrew Osmond, Sebastian Hengst, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 111 and Firefox ESR 102.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.

CVE-2023-29548:
A wrong lowering instruction in the ARM64 Ion compiler resulted in a wrong optimization result. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.

CVE-2023-29541:
Firefox did not properly handle downloads of files ending in <code>.desktop</code>, which can be interpreted to run attacker-controlled commands. <br>*This bug only affects Firefox for Linux on certain Distributions. Other operating systems are unaffected, and Mozilla is unable to enumerate all affected Linux Distributions.*. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.

CVE-2023-29539:
When handling the filename directive in the Content-Disposition header, the filename would be truncated if the filename contained a NULL character. This could have led to reflected file download attacks potentially tricking users to install malware. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.

CVE-2023-29536:
An attacker could cause the memory manager to incorrectly free a pointer that addresses attacker- controlled memory, resulting in an assertion, memory corruption, or a potentially exploitable crash. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.

CVE-2023-29535:
Following a Garbage Collector compaction, weak maps may have been accessed before they were correctly traced. This resulted in memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.

CVE-2023-29533:
A website could have obscured the fullscreen notification by using a combination of <code>window.open</code>, fullscreen requests, <code>window.name</code> assignments, and <code>setInterval</code> calls. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.

CVE-2023-23604:
A duplicate <code>SystemPrincipal</code> object could be created when parsing a non-system html document via <code>DOMParser::ParseFromSafeString</code>. This could have lead to bypassing web security checks.
This vulnerability affects Firefox < 109.

CVE-2023-1999:
There exists a use after free/double free in libwebp. An attacker can use theApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.

CVE-2023-0767:
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.

CVE-2022-46884:
A potential use-after-free vulnerability existed in SVG Images if the Refresh Driver was destroyed at an inopportune time. This could have lead to memory corruption or a potentially exploitable crash.
*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 106. This vulnerability affects Firefox < 106.

CVE-2022-36316:
When using the Performance API, an attacker was able to notice subtle differences between PerformanceEntries and thus learn whether the target URL had been subject to a redirect. This vulnerability affects Firefox < 103.

CVE-2022-38475:
An attacker could have written a value to the first element in a zero-length JavaScript array. Although the array was zero-length, the value was not written to an invalid memory address. This vulnerability affects Firefox < 104.

CVE-2022-42931:
Logins saved by Firefox should be managed by the Password Manager component which uses encryption to save files on-disk. Instead, the username (not password) was saved by the Form Manager to an unencrypted file on disk. This vulnerability affects Firefox < 106.

CVE-2023-5730:
Memory safety bugs present in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 119 and Firefox ESR < 115.4.
The Mozilla Foundation Security Advisory describes this flaw as:
Memory safety bugs present in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20240159.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4585

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4583

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4580

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4578

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44488

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4057

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4053

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4051

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29550

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29548

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29541

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29539

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29536

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29535

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29533

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23604

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1999

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46884

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36316

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38475

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42931

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730

Plugin Details

Severity: High

ID: 239048

File Name: tencentos_TSSA_2024_0159.nasl

Version: 1.1

Type: local

Published: 6/16/2025

Updated: 6/16/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:tencent:tencentos_server:firefox, cpe:/o:tencent:tencentos_server:4

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/12/2024

Vulnerability Publication Date: 10/12/2024