Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200701-02 ] Mozilla Firefox: Multiple vulnerabilities
Date: Thu, 04 Jan 2007 20:53:23
Message-Id: 20070104202724.GE15696@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200701-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Mozilla Firefox: Multiple vulnerabilities
9 Date: January 04, 2007
10 Bugs: #156023
11 ID: 200701-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been reported in Mozilla Firefox, some of
19 which may allow the remote execution of arbitrary code.
20
21 Background
22 ==========
23
24 Mozilla Firefox is a popular open-source web browser from the Mozilla
25 Project.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 www-client/mozilla-firefox < 1.5.0.9 >= 1.5.0.9
34 2 www-client/mozilla-firefox-bin < 1.5.0.9 >= 1.5.0.9
35 -------------------------------------------------------------------
36 2 affected packages on all of their supported architectures.
37 -------------------------------------------------------------------
38
39 Description
40 ===========
41
42 An anonymous researcher found evidence of memory corruption in the way
43 Mozilla Firefox handles certain types of SVG comment DOM nodes.
44 Additionally, Frederik Reiss discovered a heap-based buffer overflow in
45 the conversion of a CSS cursor. Other issues with memory corruption
46 were also fixed. Mozilla Firefox also contains less severe
47 vulnerabilities involving JavaScript and Java.
48
49 Impact
50 ======
51
52 An attacker could entice a user to view a specially crafted web page
53 that will trigger one of the vulnerabilities, possibly leading to the
54 execution of arbitrary code. It is also possible for an attacker to
55 perform cross-site scripting attacks, leading to the exposure of
56 sensitive information, like user credentials.
57
58 Workaround
59 ==========
60
61 There are no known workarounds for all the issues at this time.
62
63 Resolution
64 ==========
65
66 All Mozilla Firefox users should upgrade to the latest version:
67
68 # emerge --sync
69 # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.9"
70
71 All Mozilla Firefox binary release users should upgrade to the latest
72 version:
73
74 # emerge --sync
75 # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.9"
76
77 References
78 ==========
79
80 [ 1 ] CVE-2006-6497
81 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497
82 [ 2 ] CVE-2006-6498
83 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498
84 [ 3 ] CVE-2006-6499
85 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499
86 [ 4 ] CVE-2006-6500
87 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500
88 [ 5 ] CVE-2006-6501
89 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501
90 [ 6 ] CVE-2006-6502
91 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502
92 [ 7 ] CVE-2006-6503
93 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503
94 [ 8 ] CVE-2006-6504
95 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504
96 [ 9 ] CVE-2006-6506
97 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6506
98 [ 10 ] CVE-2006-6507
99 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6507
100
101 Availability
102 ============
103
104 This GLSA and any updates to it are available for viewing at
105 the Gentoo Security Website:
106
107 http://security.gentoo.org/glsa/glsa-200701-02.xml
108
109 Concerns?
110 =========
111
112 Security is a primary focus of Gentoo Linux and ensuring the
113 confidentiality and security of our users machines is of utmost
114 importance to us. Any security concerns should be addressed to
115 security@g.o or alternatively, you may file a bug at
116 http://bugs.gentoo.org.
117
118 License
119 =======
120
121 Copyright 2007 Gentoo Foundation, Inc; referenced text
122 belongs to its owner(s).
123
124 The contents of this document are licensed under the
125 Creative Commons - Attribution / Share Alike license.
126
127 http://creativecommons.org/licenses/by-sa/2.5