Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1510816 - (CVE-2017-16541) CVE-2017-16541 Mozilla: Proxy bypass using automount and autofs
CVE-2017-16541 Mozilla: Proxy bypass using automount and autofs
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20171103,repor...
: Reopened, Security
Depends On: 1623039 1623040 1510817 1510818 1623016 1623017 1623037 1625533 1625535 1636821
Blocks: 1636820 1623023
  Show dependency treegraph
 
Reported: 2017-11-08 04:55 EST by Andrej Nemec
Modified: 2018-10-30 12:56 EDT (History)
10 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Firefox proxy settings can be bypassed by using the automount feature with autofs to create a mount point on the local file system. Content can be loaded from this mounted file system directly using a `file:` URI, bypassing configured proxy settings. This issue only affects OS X in default configuration; on Linux systems, autofs must also be installed for the vulnerability to occur.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-09-13 00:57:33 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:2692 None None None 2018-09-12 06:55 EDT
Red Hat Product Errata RHSA-2018:2693 None None None 2018-09-12 06:57 EDT
Red Hat Product Errata RHSA-2018:3403 None None None 2018-10-30 12:56 EDT

  None (edit)
Description Andrej Nemec 2017-11-08 04:55:55 EST
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil.

Upstream issue:

https://trac.torproject.org/projects/tor/ticket/24052

References:

https://blog.torproject.org/tor-browser-709-released
https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/
https://www.wearesegment.com/research/tormoil-torbrowser-unspecified-critical-security-vulnerability/
Comment 1 Andrej Nemec 2017-11-08 04:56:21 EST
Created tor tracking bugs for this issue:

Affects: epel-all [bug 1510817]
Affects: fedora-all [bug 1510818]
Comment 4 Doran Moppert 2018-09-05 21:41:26 EDT
This was found to be a bug in Firefox ESR, fixed in 60.2:

Browser proxy settings can be bypassed by using the automount feature with autofs to create a mount point on the local file system. Content can be loaded from this mounted file system directly using a `file:` URI, bypassing configured proxy settings.

*Note: this issue only affects OS X in default configurations. On Linux systems, autofs must be installed for the vulnerability to occur and Windows is not affected.*

External Reference:

https://www.mozilla.org/en-US/security/advisories/mfsa2018-21/#CVE-2017-16541
Comment 5 errata-xmlrpc 2018-09-12 06:55:47 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:2692 https://access.redhat.com/errata/RHSA-2018:2692
Comment 6 errata-xmlrpc 2018-09-12 06:57:32 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:2693 https://access.redhat.com/errata/RHSA-2018:2693
Comment 8 Doran Moppert 2018-10-08 21:58:45 EDT
Statement:

This flaw cannot be exploited through email in Thunderbird as scripting is disabled in this for email content. It may be possible to exploit through Feeds (Atom or RSS) or other browser-like contexts.
Comment 9 errata-xmlrpc 2018-10-30 12:56:09 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:3403 https://access.redhat.com/errata/RHSA-2018:3403

Note You need to log in before you can comment on or make changes to this bug.