[ale] today's Mozilla vulnerabilities notice

Michael B. Trausch fd0man at gmail.com
Fri Jun 2 18:58:54 EDT 2006


On Fri, June 2 2006 18:32, Jim Popovitch wrote:
> Anyone have the inside scoop/opinion/synopsis on the Mozilla
> vulnerabilities that were announced today?  I'm just curious as
> to what the issue(s) was.
>
> Tia,
>
> -Jim P.
>

The only information I have is here, from CERT:

>
> Message was signed by US-CERT Operations Key <us-cert at us-cert.gov> (Key
> ID: 0x77960E74). The signature is valid, but the key is untrusted.
>                           National Cyber Alert System
>
>                 Technical Cyber Security Alert TA06-153A
>
>
> Mozilla Products Contain Multiple Vulnerabilities
>
>    Original release date: June 2, 2006
>    Last revised: --
>    Source: US-CERT
>
>
> Systems Affected
>
>      * Mozilla SeaMonkey
>      * Firefox web browser
>      * Thunderbird email client
>
>    Any products based on Mozilla components, particularly Gecko, may also
>    be affected.
>
>
> Overview
>
>    The Mozilla web browser and derived products contain several
>    vulnerabilities, the most serious of which could allow a remote
>    attacker to execute arbitrary code on an affected system.
>
>
> I. Description
>
>    Several vulnerabilities have been reported in the Mozilla web browser
>    and derived products. More detailed information is available in the
>    individual vulnerability notes, including:
>
>
>    VU#237257 - Mozilla privilege escalation using addSelectionListener
>
>    A privilege escalation vulnerability exists in the Mozilla
>    addSelectionListener method. This may allow a remote attacker to
>    execute arbitrary code.
>
>
>    VU#421529 - Mozilla contains a buffer overflow vulnerability in
>    crypto.signText()
>
>    Mozilla products contain a buffer overflow in the crypto.signText()
>    method. This may allow a remote attacker to execute arbitrary code.
>
>
>    VU#575969 - Mozilla may process content-defined setters on object
>    prototypes with elevated privileges
>
>    Mozilla allows content-defined setters on object prototypes to execute
>    with elevated privileges. This may allow a remote attacker to execute
>    arbitrary code.
>
>
>    VU#243153 - Mozilla may associate persisted XUL attributes with an
>    incorrect URL
>
>    Mozilla can allow persisted XUL attributes to associate with the wrong
>    URL. This may allow a remote attacker to execute arbitrary code.
>
>
>    VU#466673 - Mozilla contains multiple memory corruption
>    vulnerabilities
>
>    Mozilla contains several memory corruption vulnerabilities. This may
>    allow a remote attacker to execute arbitrary code.
>
>
> II. Impact
>
>    The most severe impact of these vulnerabilities could allow a remote
>    attacker to execute arbitrary code with the privileges of the user
>    running the affected application. Other effects include a denial of
>    service or local information disclosure.
>
>
> III. Solution
>
> Upgrade
>
>    Upgrade to Mozilla Firefox 1.5.0.4, Mozilla Thunderbird 1.5.0.4, or
>    SeaMonkey 1.0.2.
>
> Disable JavaScript
>
>    These vulnerabilities can be mitigated by disabling JavaScript.
>
>
> Appendix A. References
>
>      * US-CERT Vulnerability Note VU#237257 -
>        <http://www.kb.cert.org/vuls/id/237257>
>
>      * US-CERT Vulnerability Note VU#421529 -
>        <http://www.kb.cert.org/vuls/id/421529>
>
>      * US-CERT Vulnerability Note VU#575969 -
>        <http://www.kb.cert.org/vuls/id/575969>
>
>      * US-CERT Vulnerability Note VU#243153 -
>        <http://www.kb.cert.org/vuls/id/243153>
>
>      * US-CERT Vulnerability Note VU#466673 -
>        <http://www.kb.cert.org/vuls/id/466673>
>
>      * Mozilla Foundation Security Advisories -
>        <http://www.mozilla.org/security/announce/>
>
>      * US-CERT Vulnerability Notes Related to June Mozilla Security
>        Advisories -
>        <http://www.kb.cert.org/vuls/byid?searchview&query=firefox_1504>
>
>      * Mozilla Foundation Security Advisories -
>       
> <http://www.mozilla.org/projects/security/known-vulnerabilities.html>
>
>      * Firefox - Rediscover the Web - <http://www.mozilla.com/firefox/>
>
>      * Thunderbird - Reclaim your inbox -
>        <http://www.mozilla.com/thunderbird/>
>
>      * The SeaMonkey Project -
>        <http://www.mozilla.org/projects/seamonkey/>
>
>      * Securing Your Web Browser -
>       
> <http://www.us-cert.gov/reading_room/securing_browser/browser_security.ht
>ml#Mozilla_Firefox>
>
>
>  ____________________________________________________________________
>
>    The most recent version of this document can be found at:
>
>      <http://www.us-cert.gov/cas/techalerts/TA06-153A.html>
>  ____________________________________________________________________
>
>    Feedback can be directed to US-CERT Technical Staff. Please send
>    email to <cert at cert.org> with "TA06-153A Feedback VU#237257" in the
>    subject.
>  ____________________________________________________________________
>
>    For instructions on subscribing to or unsubscribing from this
>    mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
>  ____________________________________________________________________
>
>    Produced 2006 by US-CERT, a government organization.
>
>    Terms of use:
>
>      <http://www.us-cert.gov/legal.html>
>  ____________________________________________________________________
>
>
> Revision History
>
>    Jun 2, 2006: Initial release
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 191 bytes
Desc: not available




More information about the Ale mailing list