Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200409-26 ] Mozilla, Firefox, Thunderbird, Epiphany: New releases fix vulnerabilities
Date: Mon, 20 Sep 2004 20:54:10
Message-Id: 414F4309.9030307@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200409-26
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: Normal
11 Title: Mozilla, Firefox, Thunderbird, Epiphany: New releases fix
12 vulnerabilities
13 Date: September 20, 2004
14 Bugs: #63996
15 ID: 200409-26
16
17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
18
19 Synopsis
20 ========
21
22 New releases of Mozilla, Epiphany, Mozilla Thunderbird, and Mozilla
23 Firefox fix several vulnerabilities, including the remote execution of
24 arbitrary code.
25
26 Background
27 ==========
28
29 Mozilla is a popular web browser that includes a mail and newsreader.
30 Epiphany is a web browser that uses Gecko, the Mozilla rendering
31 engine. Mozilla Firefox and Mozilla Thunderbird are respectively the
32 next-generation browser and mail client from the Mozilla project.
33
34 Affected packages
35 =================
36
37 -------------------------------------------------------------------
38 Package / Vulnerable / Unaffected
39 -------------------------------------------------------------------
40 1 mozilla < 1.7.3 >= 1.7.3
41 2 mozilla-firefox < 1.0_pre >= 1.0_pre
42 3 mozilla-thunderbird < 0.8 >= 0.8
43 4 mozilla-bin < 1.7.3 >= 1.7.3
44 5 mozilla-firefox-bin < 1.0_pre >= 1.0_pre
45 6 mozilla-thunderbird-bin < 0.8 >= 0.8
46 7 epiphany < 1.2.9-r1 >= 1.2.9-r1
47 -------------------------------------------------------------------
48 7 affected packages on all of their supported architectures.
49 -------------------------------------------------------------------
50
51 Description
52 ===========
53
54 Mozilla-based products are vulnerable to multiple security issues.
55 Firstly routines handling the display of BMP images and VCards contain
56 an integer overflow and a stack buffer overrun. Specific pages with
57 long links, when sent using the "Send Page" function, and links with
58 non-ASCII hostnames could both cause heap buffer overruns.
59
60 Several issues were found and fixed in JavaScript rights handling:
61 untrusted script code could read and write to the clipboard, signed
62 scripts could build confusing grant privileges dialog boxes, and when
63 dragged onto trusted frames or windows, JavaScript links could access
64 information and rights of the target frame or window. Finally,
65 Mozilla-based mail clients (Mozilla and Mozilla Thunderbird) are
66 vulnerable to a heap overflow caused by invalid POP3 mail server
67 responses.
68
69 Impact
70 ======
71
72 An attacker might be able to run arbitrary code with the rights of the
73 user running the software by enticing the user to perform one of the
74 following actions: view a specially-crafted BMP image or VCard, use the
75 "Send Page" function on a malicious page, follow links with malicious
76 hostnames, drag multiple JavaScript links in a row to another window,
77 or connect to an untrusted POP3 mail server. An attacker could also use
78 a malicious page with JavaScript to disclose clipboard contents or
79 abuse previously-given privileges to request XPI installation
80 privileges through a confusing dialog.
81
82 Workaround
83 ==========
84
85 There is no known workaround covering all vulnerabilities.
86
87 Resolution
88 ==========
89
90 All users should upgrade to the latest stable version:
91
92 # emerge sync
93
94 # emerge -pv your-version
95 # emerge your-version
96
97 References
98 ==========
99
100 [ 1 ] Mozilla Security Advisory
101
102 http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3
103 [ 2 ] US-CERT Security Alert TA04-261A
104 http://www.us-cert.gov/cas/techalerts/TA04-261A.html
105
106 Availability
107 ============
108
109 This GLSA and any updates to it are available for viewing at
110 the Gentoo Security Website:
111
112 http://security.gentoo.org/glsa/glsa-200409-26.xml
113
114 Concerns?
115 =========
116
117 Security is a primary focus of Gentoo Linux and ensuring the
118 confidentiality and security of our users machines is of utmost
119 importance to us. Any security concerns should be addressed to
120 security@g.o or alternatively, you may file a bug at
121 http://bugs.gentoo.org.
122
123 License
124 =======
125
126 Copyright 2004 Gentoo Foundation, Inc; referenced text
127 belongs to its owner(s).
128
129 The contents of this document are licensed under the
130 Creative Commons - Attribution / Share Alike license.
131
132 http://creativecommons.org/licenses/by-sa/1.0
133
134 -----BEGIN PGP SIGNATURE-----
135 Version: GnuPG v1.2.4 (GNU/Linux)
136 Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
137
138 iD8DBQFBT0MJvcL1obalX08RAo0VAKCJut9PsDZ+w7+rmTBe4QBSsMwLDACfZ0fN
139 sdTphivV2rgS3nbS4wC416Y=
140 =O5VM
141 -----END PGP SIGNATURE-----