ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA24205] Mozilla Firefox Multiple Vulnerabilities



> ----------------------------------------------------------------------
> 
> TITLE:
> Mozilla Firefox Multiple Vulnerabilities
> 
> SECUNIA ADVISORY ID:
> SA24205
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/24205/
> 
> CRITICAL:
> Highly critical
> 
> IMPACT:
> Security Bypass, Cross Site Scripting, Spoofing, Exposure of
> sensitive information, System access
> 
> WHERE:
> From remote
> 
> SOFTWARE:
> Mozilla Firefox 1.x
> http://secunia.com/product/4227/
> Mozilla Firefox 2.0.x
> http://secunia.com/product/12434/
> 
> DESCRIPTION:
> Multiple vulnerabilities have been reported in Mozilla Firefox, which
> can be exploited by malicious people to bypass certain security
> restrictions, conduct cross-site scripting and spoofing attacks, gain
> knowledge of sensitive information, and potentially compromise a
> user's system.
> 
> 1) An error in the handling of the "locations.hostname" DOM property
> can be exploited to bypass certain security restrictions.
> 
> For more information:
> SA24175
> 
> 2) An integer underflow error in the Network Security Services (NSS)
> code when processing SSLv2 server messages can be exploited to cause
> a heap-based buffer overflow via a certificate with a public key too
> small to encrypt the "Master Secret".
> 
> Successful exploitation may allow execution of arbitrary code.
> 
> NOTE: Support for SSLv2 is disabled in Firefox 2.x. This version is
> only vulnerable if user has modified hidden internal NSS settings to
> re-enable SSLv2 support.
> 
> 3) It is possible to conduct cross-site scripting attacks against
> sites containing a frame with a "data:" URI as source.
> 
> Successful exploitation requires that a user is tricked into visiting
> a malicious website and opening a blocked popup.
> 
> 4) It is possible to open windows containing local files thereby
> stealing the contents when the full path of a locally saved file
> containing malicious script code is known. This can be exploited in
> combination with a flaw in the seeding of the pseudo-random number
> generator causing downloaded files to be saved to temporary files
> with a somewhat predictable name.
> 
> Successful exploitation requires that a user is tricked into visiting
> a malicious website and opening a blocked popup.
> 
> 5) Browser UI elements like the host name and security indicators can
> be spoofed using a specially crafted custom cursor and manipulating
> the CSS3 hotspot property.
> 
> 6) It may be possible to gain knowledge of sensitive information from
> a website due to an error resulting in two web pages colliding in the
> disk cache thereby potentially appending part of one document to the
> other.
> 
> Successful exploitation requires that a user is tricked into visiting
> a malicious website while visiting the target website.
> 
> 7) Various errors in the Mozilla parser when handling invalid
> trailing characters in HTML tag attribute names and during processing
> of UTF-7 content when child frames inherit the character set of its
> parent window can be exploited to conduct cross-site scripting
> attacks.
> 
> 8) A vulnerability in the Password Manager may be exploited to
> conduct phishing attacks.
> 
> For more information:
> SA23046
> 
> 9) Multiple memory corruption errors exist in the layout engine,
> JavaScript engine, and in SVG. Some of these may be exploited to
> execute arbitrary code on a user's system.
> 
> SOLUTION:
> Update to version 2.0.0.2 or 1.5.0.10.
> 
> PROVIDED AND/OR DISCOVERED BY:
> 1) Michal Zalewski
> 2) Discovered by regenrecht and reported via iDefense Labs.
> 3) shutdown
> 4) Michal Zalewski
> 5) David Eckel
> 6) Aad
> 7) RSnake and Stefan Esser.
> 8) Robert Chapin
> 9) Jesse Ruderman, Martijn Wargers, Olli Pettay, Tom Ferris, Brian
> Crowder, Igor Bukanov, Johnny Stenback, moz_bug_r_a4, and shutdown.
> 
> ORIGINAL ADVISORY:
> Mozilla Foundation:
> http://www.mozilla.org/security/announce/2007/mfsa2007-07.html
> http://www.mozilla.org/security/announce/2007/mfsa2007-06.html
> http://www.mozilla.org/security/announce/2007/mfsa2007-05.html
> http://www.mozilla.org/security/announce/2007/mfsa2007-04.html
> http://www.mozilla.org/security/announce/2007/mfsa2007-03.html
> http://www.mozilla.org/security/announce/2007/mfsa2007-02.html
> http://www.mozilla.org/security/announce/2007/mfsa2007-01.html
> 
> iDefense Labs:
> http://labs.idefense.com/intelligence/vulnerabilities/display.
> php?id=482
> 
> OTHER REFERENCES:
> SA24175:
> http://secunia.com/advisories/24175/
> 
> SA23046:
> http://secunia.com/advisories/23046/
> 



 




Copyright © Lexa Software, 1996-2009.