Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200605-06 ] Mozilla Firefox: Potential remote code execution
Date: Sat, 06 May 2006 17:46:20
Message-Id: 445CD931.5050800@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200605-06
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Mozilla Firefox: Potential remote code execution
9 Date: May 06, 2006
10 Bugs: #131138
11 ID: 200605-06
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 The Mozilla Firefox 1.5 line is vulnerable to a buffer overflow in the
19 JavaScript extension which may in theory lead to remote execution of
20 arbitrary code.
21
22 Background
23 ==========
24
25 Mozilla Firefox is the next-generation web browser from the Mozilla
26 project.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 www-client/mozilla-firefox < 1.5.0.3 >= 1.5.0.3
35 < 1.5
36 2 www-client/mozilla-firefox-bin < 1.5.0.3 >= 1.5.0.3
37 < 1.5
38 -------------------------------------------------------------------
39 2 affected packages on all of their supported architectures.
40 -------------------------------------------------------------------
41
42 Description
43 ===========
44
45 Martijn Wargers and Nick Mott discovered a vulnerability when rendering
46 malformed JavaScript content. The Mozilla Firefox 1.0 line is not
47 affected.
48
49 Impact
50 ======
51
52 If JavaScript is enabled, by tricking a user into visiting a malicious
53 web page which would send a specially crafted HTML script that contains
54 references to deleted objects with the "designMode" property enabled,
55 an attacker can crash the web browser and in theory manage to execute
56 arbitrary code with the rights of the user running the browser.
57
58 Workaround
59 ==========
60
61 There is no known workaround at this time.
62
63 Resolution
64 ==========
65
66 All Mozilla Firefox 1.5 users should upgrade to the latest version:
67
68 # emerge --sync
69 # emerge --ask --oneshot --verbose
70 ">=www-client/mozilla-firefox-1.5.0.3"
71
72 All Mozilla Firefox 1.5 binary users should upgrade to the latest
73 version:
74
75 # emerge --sync
76 # emerge --ask --oneshot --verbose
77 ">=www-client/mozilla-firefox-bin-1.5.0.3"
78
79 References
80 ==========
81
82 [ 1 ] CVE-2006-1993
83 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1993
84
85 Availability
86 ============
87
88 This GLSA and any updates to it are available for viewing at
89 the Gentoo Security Website:
90
91 http://security.gentoo.org/glsa/glsa-200605-06.xml
92
93 Concerns?
94 =========
95
96 Security is a primary focus of Gentoo Linux and ensuring the
97 confidentiality and security of our users machines is of utmost
98 importance to us. Any security concerns should be addressed to
99 security@g.o or alternatively, you may file a bug at
100 http://bugs.gentoo.org.
101
102 License
103 =======
104
105 Copyright 2006 Gentoo Foundation, Inc; referenced text
106 belongs to its owner(s).
107
108 The contents of this document are licensed under the
109 Creative Commons - Attribution / Share Alike license.
110
111 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature