ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA21906] Mozilla Firefox Multiple Vulnerabilities



óÉÓÔÅÍÁÔÉÚÁÃÉÑ ÕÑÚ×ÉÍÏÓÔÅÊ

> ----------------------------------------------------------------------
> 
> TITLE:
> Mozilla Firefox Multiple Vulnerabilities
> 
> SECUNIA ADVISORY ID:
> SA21906
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/21906/
> 
> CRITICAL:
> Highly critical
> 
> IMPACT:
> Security Bypass, Cross Site Scripting, Spoofing, DoS, System access
> 
> WHERE:
> From remote
> 
> SOFTWARE:
> Mozilla Firefox 1.x
> http://secunia.com/product/4227/
> Mozilla Firefox 0.x
> http://secunia.com/product/3256/
> 
> DESCRIPTION:
> Some vulnerabilities have been reported in Mozilla Firefox, which can
> be exploited by malicious people to conduct man-in-the-middle,
> spoofing, and cross-site scripting attacks, and potentially
> compromise a user's system.
> 
> 1) An error in the handling of JavaScript regular expressions
> containing a minimal quantifier can be exploited to cause a
> heap-based buffer overflow.
> 
> Successful exploitation may allow execution of arbitrary code.
> 
> 2) The auto-update mechanism uses SSL to communicate securely. The
> problem is that users may have accepted an unverifiable self-signed
> certificate when visiting a web site, which will allow an attacker to
> redirect the update check to a malicious web site in a
> man-in-the-middle attack.
> 
> 3) Some time-dependent errors during text display can be exploited to
> corrupt memory.
> 
> Successful exploitation may allow execution of arbitrary code.
> 
> This is related to:
> SA21513
> 
> 4) An error exists within the verification of certain signatures in
> the bundled Network Security Services (NSS) library.
> 
> For more information:
> SA21903
> 
> 5) An error in the cross-domain handling can be exploited to inject
> arbitrary HTML and script code in a sub-frame of another web site via
> a "[window].frames[index].document.open()" call.
> 
> 6) An error exists due to blocked popups opened from the status bar
> via the "blocked popups" functionality being opened in an incorrect
> context in certain situations. This may be exploited to execute
> arbitrary HTML and script code in a user's browser session in context
> of an arbitrary web site.
> 
> 7) Some unspecified memory corruption errors may be exploited to
> execute arbitrary code.
> 
> SOLUTION:
> Update to version 1.5.0.7.
> http://www.mozilla.com/firefox/
> 
> PROVIDED AND/OR DISCOVERED BY:
> 1) Priit Laes, CanadianGuy, Girts Folkmanis, and Catalin Patulea
> 2) Jon Oberheide
> 3) Jonathan Watt and Michal Zalewski
> 4) Philip Mackenzie and Marius Schilder, Google
> 5-6) shutdown
> 7) Bernd Mielke, Georgi Guninski, Igor Bukanov, Jesse Ruderman,
> Martijn Wargers, Mats Palmgren, Olli Pettay, shutdown, and Weston
> Carloss
> 
> ORIGINAL ADVISORY:
> 1) http://www.mozilla.org/security/announce/2006/mfsa2006-57.html
> 2) http://www.mozilla.org/security/announce/2006/mfsa2006-58.html
> 3) http://www.mozilla.org/security/announce/2006/mfsa2006-59.html
> 4) http://www.mozilla.org/security/announce/2006/mfsa2006-60.html
> 5) http://www.mozilla.org/security/announce/2006/mfsa2006-61.html
> 6) http://www.mozilla.org/security/announce/2006/mfsa2006-62.html
> 7) http://www.mozilla.org/security/announce/2006/mfsa2006-64.html
> 
> OTHER REFERENCES:
> SA21513:
> http://secunia.com/advisories/21513/
> 
> SA21903:
> http://secunia.com/advisories/21903/
> 



 




Copyright © Lexa Software, 1996-2009.