[jmm@inutil.org: Bug#329778: mozilla: Multiple security issues fixed in 1.7.12]

Martin Schulze joey at infodrom.org
Wed Sep 28 08:52:28 UTC 2005


FYI

Regards,

	Joey

----- Forwarded message from Moritz Muehlenhoff <jmm at inutil.org> -----

Subject: Bug#329778: mozilla: Multiple security issues fixed in 1.7.12
From: Moritz Muehlenhoff <jmm at inutil.org>
To: Debian Bug Tracking System <submit at bugs.debian.org>
Date: Fri, 23 Sep 2005 11:53:17 +0200
X-Folder: debian-security-private at lists.infodrom.org

Package: mozilla
Version: 2:1.7.11-1
Severity: grave
Tags: security
Justification: user security hole

As usual Mozilla 1.7.12 fixes several security issues. I'm copying
the bug descriptions from a Red Hat advisory, because they are not
yet public on the Mozilla website:

<-->
A bug was found in the way Mozilla processes XBM image files. If a user
views a specially crafted XBM file, it becomes possible to execute
arbitrary code as the user running Mozilla. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2005-2701 to
this issue.

A bug was found in the way Mozilla processes certain Unicode sequences.
It may be possible to execute arbitrary code as the user running
Mozilla, if the user views a specially crafted Unicode sequence.
(CAN-2005-2702)

A bug was found in the way Mozilla makes XMLHttp requests. It is possible
that a malicious web page could leverage this flaw to exploit other proxy
or server flaws from the victim's machine. It is also possible that this
flaw could be leveraged to send XMLHttp requests to hosts other than the
originator; the default behavior of the browser is to disallow this.
(CAN-2005-2703)

A bug was found in the way Mozilla implemented its XBL interface. It may be
possible for a malicious web page to create an XBL binding in a way
that would allow arbitrary JavaScript execution with chrome permissions.
Please note that in Mozilla 1.7.10 this issue is not directly exploitable
and would need to leverage other unknown exploits. (CAN-2005-2704)

An integer overflow bug was found in Mozilla's JavaScript engine. Under
favorable conditions, it may be possible for a malicious web page to
execute arbitrary code as the user running Mozilla. (CAN-2005-2705)

A bug was found in the way Mozilla displays about: pages. It is possible
for a malicious web page to open an about: page, such as about:mozilla, in
such a way that it becomes possible to execute JavaScript with chrome
privileges. (CAN-2005-2706)

A bug was found in the way Mozilla opens new windows. It is possible for a
malicious web site to construct a new window without any user interface
components, such as the address bar and the status bar. This window could
hen be used to mislead the user for malicious purposes. (CAN-2005-2707)

-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.4.29-vs1.2.10
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages mozilla depends on:
pn  mozilla-browser                          Not found.
pn  mozilla-mailnews                         Not found.
pn  mozilla-psm                              Not found.

----- End forwarded message -----

-- 
The good thing about standards is that there are so many to choose from.
		-- Andrew S. Tanenbaum



More information about the pkg-mozilla-maintainers mailing list