ArchLinux: 201508-1: firefox: local file stealing via PDF reader
Summary
Security researcher Cody Crews reported on a way to violate the same
origin policy and inject script into a non-privileged part of the
built-in PDF Viewer. This would allow an attacker to read and steal
sensitive local files on the victim's computer.
Mozilla has received reports that an exploit based on this vulnerability
has been found in the wild.
Resolution
Upgrade to 39.0.3-1.
# pacman -Syu "firefox>=39.0.3-1"
The problem has been fixed upstream in version 39.0.3.
References
https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/ https://www.mozilla.org/en-US/security/advisories/mfsa2015-78/ https://access.redhat.com/security/cve/CVE-2015-4495 https://access.redhat.com/articles/1563163
![Dist Arch](/images/distros/dist-arch.png)
Workaround
This issue can be mitigated by disabling the built-in PDF viewer, PDF.js.
This can be done by typing about:config in the address bar, pressing
Enter, looking for the pdfjs.disabled value and setting it to True by
right-clicking on the line and left-clicking "Toggle". Note that
accessing the about:config page might trigger a "This might void your
warranty!" warning, easily dismissed by clicking on the "I'll be
careful, I promise!" button.