ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA23282] Mozilla Firefox Multiple Vulnerabilities



> 
> TITLE:
> Mozilla Firefox Multiple Vulnerabilities
> 
> SECUNIA ADVISORY ID:
> SA23282
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/23282/
> 
> CRITICAL:
> Highly critical
> 
> IMPACT:
> Cross Site Scripting, Exposure of sensitive information, DoS, System
> access
> 
> WHERE:
> From remote
> 
> SOFTWARE:
> Mozilla Firefox 1.x
> http://secunia.com/product/4227/
> Mozilla Firefox 2.0.x
> http://secunia.com/product/12434/
> 
> DESCRIPTION:
> Multiple vulnerabilities have been reported in Mozilla Firefox, which
> can be exploited by malicious people to gain knowledge of certain
> information, conduct cross-site scripting attacks, and potentially
> compromise a user's system.
> 
> 1)Various errors in the layout engine and JavaScript engine can be
> exploited to cause memory corruption and some may potentially allow
> execution of arbitrary code.
> 
> 2) An error when reducing the CPU's floating point precision, which
> may happen on Windows when loading a plugin creating a Direct3D
> device, may cause the "js_dtoa()" function to not exit and instead
> cause a memory corruption.
> 
> 3) A boundary error when setting the cursor to a Windows bitmap using
> the CSS cursor property can be exploited to cause a heap-based buffer
> overflow.
> 
> 4) An unspecified error in the "watch()" JavaScript function can be
> exploited to execute arbitrary code. 
> 
> 5) An error in LiveConnect causes an already freed object to be used
> and may potentially allow execution of arbitrary code.
> 
> 6) An error in the handling of the "src" attribute of IMG elements
> loaded in a frame can be exploited to change the attribute to a
> "javascript:" URI. This allows execution of arbitrary HTML and script
> code in a user's browser session.
> 
> 7) A memory corruption error within the SVG processing may allow
> execution of arbitrary code by appending an SVG comment DOM node from
> one document into another type of document (e.g. HTML).
> 
> 8) The "Feed Preview" feature of Firefox 2.0 may leak feed-browsing
> habits to websites when retrieving the icons of installed web-based
> feed viewers.
> 
> 9) A Function prototype regression in Firefox 2.0 can be exploited to
> execute arbitrary HTML and script code in a user's browser session.
> 
> SOLUTION:
> Update to version 1.5.0.9 or 2.0.0.1.
> 
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits the following:
> 1) Andrew Miller, David Baron, moz_bug_r_a4, Georgi Guninski, Jesse
> Ruderman, Olli Pettay, Igor Bukanov, and Vladimir Vukicevic.
> 2) Keith Victor
> 3) Frederik Reiss
> 4) Shutdown
> 5) Steven Michaud
> 6) moz_bug_r_a4
> 7) An anonymous person via ZDI.
> 8) Jared Breland
> 9) moz_bug_r_a4
> 
> ORIGINAL ADVISORY:
> Mozilla:
> http://www.mozilla.org/security/announce/2006/mfsa2006-68.html
> http://www.mozilla.org/security/announce/2006/mfsa2006-69.html
> http://www.mozilla.org/security/announce/2006/mfsa2006-70.html
> http://www.mozilla.org/security/announce/2006/mfsa2006-71.html
> http://www.mozilla.org/security/announce/2006/mfsa2006-72.html
> http://www.mozilla.org/security/announce/2006/mfsa2006-73.html
> http://www.mozilla.org/security/announce/2006/mfsa2006-75.html
> http://www.mozilla.org/security/announce/2006/mfsa2006-76.html
> 



 




Copyright © Lexa Software, 1996-2009.