1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
5 |
Gentoo Linux Security Advisory GLSA 200409-26 |
6 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
7 |
http://security.gentoo.org/ |
8 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
9 |
|
10 |
Severity: Normal |
11 |
Title: Mozilla, Firefox, Thunderbird, Epiphany: New releases fix |
12 |
vulnerabilities |
13 |
Date: September 20, 2004 |
14 |
Bugs: #63996 |
15 |
ID: 200409-26 |
16 |
|
17 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
18 |
|
19 |
Synopsis |
20 |
======== |
21 |
|
22 |
New releases of Mozilla, Epiphany, Mozilla Thunderbird, and Mozilla |
23 |
Firefox fix several vulnerabilities, including the remote execution of |
24 |
arbitrary code. |
25 |
|
26 |
Background |
27 |
========== |
28 |
|
29 |
Mozilla is a popular web browser that includes a mail and newsreader. |
30 |
Epiphany is a web browser that uses Gecko, the Mozilla rendering |
31 |
engine. Mozilla Firefox and Mozilla Thunderbird are respectively the |
32 |
next-generation browser and mail client from the Mozilla project. |
33 |
|
34 |
Affected packages |
35 |
================= |
36 |
|
37 |
------------------------------------------------------------------- |
38 |
Package / Vulnerable / Unaffected |
39 |
------------------------------------------------------------------- |
40 |
1 mozilla < 1.7.3 >= 1.7.3 |
41 |
2 mozilla-firefox < 1.0_pre >= 1.0_pre |
42 |
3 mozilla-thunderbird < 0.8 >= 0.8 |
43 |
4 mozilla-bin < 1.7.3 >= 1.7.3 |
44 |
5 mozilla-firefox-bin < 1.0_pre >= 1.0_pre |
45 |
6 mozilla-thunderbird-bin < 0.8 >= 0.8 |
46 |
7 epiphany < 1.2.9-r1 >= 1.2.9-r1 |
47 |
------------------------------------------------------------------- |
48 |
7 affected packages on all of their supported architectures. |
49 |
------------------------------------------------------------------- |
50 |
|
51 |
Description |
52 |
=========== |
53 |
|
54 |
Mozilla-based products are vulnerable to multiple security issues. |
55 |
Firstly routines handling the display of BMP images and VCards contain |
56 |
an integer overflow and a stack buffer overrun. Specific pages with |
57 |
long links, when sent using the "Send Page" function, and links with |
58 |
non-ASCII hostnames could both cause heap buffer overruns. |
59 |
|
60 |
Several issues were found and fixed in JavaScript rights handling: |
61 |
untrusted script code could read and write to the clipboard, signed |
62 |
scripts could build confusing grant privileges dialog boxes, and when |
63 |
dragged onto trusted frames or windows, JavaScript links could access |
64 |
information and rights of the target frame or window. Finally, |
65 |
Mozilla-based mail clients (Mozilla and Mozilla Thunderbird) are |
66 |
vulnerable to a heap overflow caused by invalid POP3 mail server |
67 |
responses. |
68 |
|
69 |
Impact |
70 |
====== |
71 |
|
72 |
An attacker might be able to run arbitrary code with the rights of the |
73 |
user running the software by enticing the user to perform one of the |
74 |
following actions: view a specially-crafted BMP image or VCard, use the |
75 |
"Send Page" function on a malicious page, follow links with malicious |
76 |
hostnames, drag multiple JavaScript links in a row to another window, |
77 |
or connect to an untrusted POP3 mail server. An attacker could also use |
78 |
a malicious page with JavaScript to disclose clipboard contents or |
79 |
abuse previously-given privileges to request XPI installation |
80 |
privileges through a confusing dialog. |
81 |
|
82 |
Workaround |
83 |
========== |
84 |
|
85 |
There is no known workaround covering all vulnerabilities. |
86 |
|
87 |
Resolution |
88 |
========== |
89 |
|
90 |
All users should upgrade to the latest stable version: |
91 |
|
92 |
# emerge sync |
93 |
|
94 |
# emerge -pv your-version |
95 |
# emerge your-version |
96 |
|
97 |
References |
98 |
========== |
99 |
|
100 |
[ 1 ] Mozilla Security Advisory |
101 |
|
102 |
http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3 |
103 |
[ 2 ] US-CERT Security Alert TA04-261A |
104 |
http://www.us-cert.gov/cas/techalerts/TA04-261A.html |
105 |
|
106 |
Availability |
107 |
============ |
108 |
|
109 |
This GLSA and any updates to it are available for viewing at |
110 |
the Gentoo Security Website: |
111 |
|
112 |
http://security.gentoo.org/glsa/glsa-200409-26.xml |
113 |
|
114 |
Concerns? |
115 |
========= |
116 |
|
117 |
Security is a primary focus of Gentoo Linux and ensuring the |
118 |
confidentiality and security of our users machines is of utmost |
119 |
importance to us. Any security concerns should be addressed to |
120 |
security@g.o or alternatively, you may file a bug at |
121 |
http://bugs.gentoo.org. |
122 |
|
123 |
License |
124 |
======= |
125 |
|
126 |
Copyright 2004 Gentoo Foundation, Inc; referenced text |
127 |
belongs to its owner(s). |
128 |
|
129 |
The contents of this document are licensed under the |
130 |
Creative Commons - Attribution / Share Alike license. |
131 |
|
132 |
http://creativecommons.org/licenses/by-sa/1.0 |
133 |
|
134 |
-----BEGIN PGP SIGNATURE----- |
135 |
Version: GnuPG v1.2.4 (GNU/Linux) |
136 |
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org |
137 |
|
138 |
iD8DBQFBT0MJvcL1obalX08RAo0VAKCJut9PsDZ+w7+rmTBe4QBSsMwLDACfZ0fN |
139 |
sdTphivV2rgS3nbS4wC416Y= |
140 |
=O5VM |
141 |
-----END PGP SIGNATURE----- |