Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200507-14 ] Mozilla Firefox: Multiple vulnerabilities
Date: Fri, 15 Jul 2005 08:31:01
Message-Id: 42D77154.2050709@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200507-14
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Mozilla Firefox: Multiple vulnerabilities
9 Date: July 15, 2005
10 Bugs: #95199
11 ID: 200507-14
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Several vulnerabilities in Mozilla Firefox allow attacks ranging from
19 execution of script code with elevated privileges to information leak.
20
21 Background
22 ==========
23
24 Mozilla Firefox is the next-generation web browser from the Mozilla
25 project.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 www-client/mozilla-firefox < 1.0.5 >= 1.0.5
34 2 www-client/mozilla-firefox-bin < 1.0.5 >= 1.0.5
35 -------------------------------------------------------------------
36 2 affected packages on all of their supported architectures.
37 -------------------------------------------------------------------
38
39 Description
40 ===========
41
42 The following vulnerabilities were found and fixed in Mozilla Firefox:
43
44 * "moz_bug_r_a4" and "shutdown" discovered that Firefox was
45 improperly cloning base objects (MFSA 2005-56).
46
47 * Michael Krax reported that Firefox was not correctly handling
48 JavaScript URLs from external applications (MFSA 2005-53), and that
49 the "Set as wallpaper" function in versions 1.0.3 and 1.0.4 could be
50 abused to load JavaScript (MFSA 2005-47).
51
52 * Several researchers reported ways to trick Firefox into accepting
53 events generated by web content (MFSA 2005-45).
54
55 * Kohei Yoshino discovered a new way to inject script from the
56 sidebar panel using data: (MFSA 2005-49).
57
58 * "moz_bug_r_a4" reported that Firefox failed to validate XHTML DOM
59 nodes properly (MFSA 2005-55), and that XBL scripts ran even when
60 Javascript is disabled (MFSA 2005-46).
61
62 * "shutdown" discovered a possibly exploitable crash in
63 InstallVersion.compareTo (MFSA 2005-50).
64
65 * Finally, Secunia discovered that a child frame can call top.focus()
66 even if the framing page comes from a different origin and has
67 overridden the focus() routine (MFSA 2005-52), and that the frame
68 injection spoofing bug fixed in 1.0.2 was mistakenly reintroduced in
69 1.0.3 and 1.0.4 (MFSA 2005-51).
70
71 Impact
72 ======
73
74 A remote attacker could craft malicious web pages that would leverage
75 these issues to inject and execute arbitrary script code with elevated
76 privileges, steal cookies or other information from web pages, or spoof
77 content.
78
79 Workaround
80 ==========
81
82 There are no known workarounds for all the issues at this time.
83
84 Resolution
85 ==========
86
87 All Mozilla Firefox users should upgrade to the latest version:
88
89 # emerge --sync
90 # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.5"
91
92 All Mozilla Firefox binary users should upgrade to the latest version:
93
94 # emerge --sync
95 # emerge --ask --oneshot --verbose
96 ">=www-client/mozilla-firefox-bin-1.0.5"
97
98 References
99 ==========
100
101 [ 1 ] Mozilla Foundation Security Advisories
102
103 http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox
104
105 Availability
106 ============
107
108 This GLSA and any updates to it are available for viewing at
109 the Gentoo Security Website:
110
111 http://security.gentoo.org/glsa/glsa-200507-14.xml
112
113 Concerns?
114 =========
115
116 Security is a primary focus of Gentoo Linux and ensuring the
117 confidentiality and security of our users machines is of utmost
118 importance to us. Any security concerns should be addressed to
119 security@g.o or alternatively, you may file a bug at
120 http://bugs.gentoo.org.
121
122 License
123 =======
124
125 Copyright 2005 Gentoo Foundation, Inc; referenced text
126 belongs to its owner(s).
127
128 The contents of this document are licensed under the
129 Creative Commons - Attribution / Share Alike license.
130
131 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature