Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200509-11 ] Mozilla Suite, Mozilla Firefox: Buffer overflow
Date: Sun, 18 Sep 2005 19:58:39
Message-Id: 432DC396.8040308@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200509-11
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Mozilla Suite, Mozilla Firefox: Buffer overflow
9 Date: September 18, 2005
10 Bugs: #105396
11 ID: 200509-11
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Mozilla Suite and Firefox are vulnerable to a buffer overflow that
19 might be exploited to execute arbitrary code.
20
21 Background
22 ==========
23
24 The Mozilla Suite is a popular all-in-one web browser that includes a
25 mail and news reader. Mozilla Firefox is the next-generation browser
26 from the Mozilla project. They both support Internationalized Domain
27 Names (IDN), which are domain names represented by local language
28 characters.
29
30 Affected packages
31 =================
32
33 -------------------------------------------------------------------
34 Package / Vulnerable / Unaffected
35 -------------------------------------------------------------------
36 1 www-client/mozilla-firefox <= 1.0.6-r6 >= 1.0.6-r7
37 2 www-client/mozilla <= 1.7.11-r2 >= 1.7.11-r3
38 3 www-client/mozilla-firefox-bin <= 1.0.6-r2 Vulnerable!
39 4 www-client/mozilla-bin <= 1.7.11 Vulnerable!
40 -------------------------------------------------------------------
41 NOTE: Certain packages are still vulnerable. Users should migrate
42 to another package if one is available or wait for the
43 existing packages to be marked stable by their
44 architecture maintainers.
45 -------------------------------------------------------------------
46 4 affected packages on all of their supported architectures.
47 -------------------------------------------------------------------
48
49 Description
50 ===========
51
52 The Mozilla Suite and Firefox are both vulnerable to a buffer overflow
53 while processing hostnames containing multiple hyphens. Note that
54 browsers that have disabled IDN support are immune to this flaw.
55
56 Impact
57 ======
58
59 A remote attacker could setup a malicious site and entice a victim to
60 visit it, triggering the buffer overflow and potentially resulting in
61 the execution of arbitrary code with the victim's privileges.
62
63 Workaround
64 ==========
65
66 You can disable the IDN support by opening the "about:config" page in
67 the browser and manually toggling the "network.IDN" property to
68 "false". Alternatively, you can install a security patch by following
69 the patching instructions given in References.
70
71 Resolution
72 ==========
73
74 All Mozilla Firefox users should upgrade to the latest version:
75
76 # emerge --sync
77 # emerge --ask --oneshot --verbose
78 ">=www-client/mozilla-firefox-1.0.6-r7"
79
80 All Mozilla Suite users should upgrade to the latest version:
81
82 # emerge --sync
83 # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.11-r3"
84
85 There are no fixed Mozilla Firefox or Mozilla Suite binaries yet. Users
86 of the mozilla-bin or mozilla-firefox-bin packages should either switch
87 to the source-based versions or apply the workaround.
88
89 References
90 ==========
91
92 [ 1 ] CAN-2005-2871
93 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2871
94 [ 2 ] Mozilla Foundation patching instructions
95 https://addons.mozilla.org/messages/307259.html
96
97 Availability
98 ============
99
100 This GLSA and any updates to it are available for viewing at
101 the Gentoo Security Website:
102
103 http://security.gentoo.org/glsa/glsa-200509-11.xml
104
105 Concerns?
106 =========
107
108 Security is a primary focus of Gentoo Linux and ensuring the
109 confidentiality and security of our users machines is of utmost
110 importance to us. Any security concerns should be addressed to
111 security@g.o or alternatively, you may file a bug at
112 http://bugs.gentoo.org.
113
114 License
115 =======
116
117 Copyright 2005 Gentoo Foundation, Inc; referenced text
118 belongs to its owner(s).
119
120 The contents of this document are licensed under the
121 Creative Commons - Attribution / Share Alike license.
122
123 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature