From: | Raphael Marichez <falco@g.o> |
---|---|
To: | gentoo-announce@g.o |
Cc: | bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com |
Subject: | [gentoo-announce] [ GLSA 200701-02 ] Mozilla Firefox: Multiple vulnerabilities |
Date: | Thu, 04 Jan 2007 20:53:23 |
Message-Id: | 20070104202724.GE15696@falco.falcal.net |
1 | - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
2 | Gentoo Linux Security Advisory GLSA 200701-02 |
3 | - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
4 | http://security.gentoo.org/ |
5 | - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
6 | |
7 | Severity: Normal |
8 | Title: Mozilla Firefox: Multiple vulnerabilities |
9 | Date: January 04, 2007 |
10 | Bugs: #156023 |
11 | ID: 200701-02 |
12 | |
13 | - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
14 | |
15 | Synopsis |
16 | ======== |
17 | |
18 | Multiple vulnerabilities have been reported in Mozilla Firefox, some of |
19 | which may allow the remote execution of arbitrary code. |
20 | |
21 | Background |
22 | ========== |
23 | |
24 | Mozilla Firefox is a popular open-source web browser from the Mozilla |
25 | Project. |
26 | |
27 | Affected packages |
28 | ================= |
29 | |
30 | ------------------------------------------------------------------- |
31 | Package / Vulnerable / Unaffected |
32 | ------------------------------------------------------------------- |
33 | 1 www-client/mozilla-firefox < 1.5.0.9 >= 1.5.0.9 |
34 | 2 www-client/mozilla-firefox-bin < 1.5.0.9 >= 1.5.0.9 |
35 | ------------------------------------------------------------------- |
36 | 2 affected packages on all of their supported architectures. |
37 | ------------------------------------------------------------------- |
38 | |
39 | Description |
40 | =========== |
41 | |
42 | An anonymous researcher found evidence of memory corruption in the way |
43 | Mozilla Firefox handles certain types of SVG comment DOM nodes. |
44 | Additionally, Frederik Reiss discovered a heap-based buffer overflow in |
45 | the conversion of a CSS cursor. Other issues with memory corruption |
46 | were also fixed. Mozilla Firefox also contains less severe |
47 | vulnerabilities involving JavaScript and Java. |
48 | |
49 | Impact |
50 | ====== |
51 | |
52 | An attacker could entice a user to view a specially crafted web page |
53 | that will trigger one of the vulnerabilities, possibly leading to the |
54 | execution of arbitrary code. It is also possible for an attacker to |
55 | perform cross-site scripting attacks, leading to the exposure of |
56 | sensitive information, like user credentials. |
57 | |
58 | Workaround |
59 | ========== |
60 | |
61 | There are no known workarounds for all the issues at this time. |
62 | |
63 | Resolution |
64 | ========== |
65 | |
66 | All Mozilla Firefox users should upgrade to the latest version: |
67 | |
68 | # emerge --sync |
69 | # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.9" |
70 | |
71 | All Mozilla Firefox binary release users should upgrade to the latest |
72 | version: |
73 | |
74 | # emerge --sync |
75 | # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.9" |
76 | |
77 | References |
78 | ========== |
79 | |
80 | [ 1 ] CVE-2006-6497 |
81 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497 |
82 | [ 2 ] CVE-2006-6498 |
83 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498 |
84 | [ 3 ] CVE-2006-6499 |
85 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499 |
86 | [ 4 ] CVE-2006-6500 |
87 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500 |
88 | [ 5 ] CVE-2006-6501 |
89 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501 |
90 | [ 6 ] CVE-2006-6502 |
91 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502 |
92 | [ 7 ] CVE-2006-6503 |
93 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503 |
94 | [ 8 ] CVE-2006-6504 |
95 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504 |
96 | [ 9 ] CVE-2006-6506 |
97 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6506 |
98 | [ 10 ] CVE-2006-6507 |
99 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6507 |
100 | |
101 | Availability |
102 | ============ |
103 | |
104 | This GLSA and any updates to it are available for viewing at |
105 | the Gentoo Security Website: |
106 | |
107 | http://security.gentoo.org/glsa/glsa-200701-02.xml |
108 | |
109 | Concerns? |
110 | ========= |
111 | |
112 | Security is a primary focus of Gentoo Linux and ensuring the |
113 | confidentiality and security of our users machines is of utmost |
114 | importance to us. Any security concerns should be addressed to |
115 | security@g.o or alternatively, you may file a bug at |
116 | http://bugs.gentoo.org. |
117 | |
118 | License |
119 | ======= |
120 | |
121 | Copyright 2007 Gentoo Foundation, Inc; referenced text |
122 | belongs to its owner(s). |
123 | |
124 | The contents of this document are licensed under the |
125 | Creative Commons - Attribution / Share Alike license. |
126 | |
127 | http://creativecommons.org/licenses/by-sa/2.5 |