[Secure-testing-team] Bug#505557: Mozilla Firefox 3 Multiple Vulnerabilities

Giuseppe Iuculano giuseppe at iuculano.it
Thu Nov 13 14:26:20 UTC 2008


Package: iceweasel
Version: 3.0.3-3
Severity: critical
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Hi,

The following SA (Secunia Advisory) id was published for Firefox 3.

SA32713[1]

Description:
Some vulnerabilities have been reported in Mozilla Firefox, which can be
exploited by malicious people to disclose sensitive information, bypass
certain security restrictions, or compromise a user's system.

1) An error when processing "file:" URIs can be exploited to execute
arbitrary JavaScript code with chrome privileges by tricking a user into
opening a malicious local file in a tab previously opened for a
"chrome:" document or a privileged "about:" URI.

2) Various errors in the layout engine can be exploited to cause memory
corruptions and potentially execute arbitrary code.

3) An error in the browser engine can be exploited to cause a crash.

For more information see vulnerability #5 in:
SA32693

4) An error in the JavaScript engine can be exploited to cause a memory
corruption and potentially execute arbitrary code.

5) An error in the browser's restore feature can be exploited to violate
the same-origin policy.

For more information see vulnerability #7 in:
SA32693

6) An error in the processing of the "http-index-format" MIME type can
be exploited to execute arbitrary code.

For more information see vulnerability #8 in:
SA32693

7) An error in the DOM constructing code can be exploited to dereference
uninitialized memory and potentially execute arbitrary code:

For more information see vulnerability #9 in:
SA32693

8) An error in "nsXMLHttpRequest::NotifyEventListeners()" can be
exploited to bypass certain security restrictions.

For more information see vulnerability #10 in:
SA32693

9) An error can be exploited to manipulate signed JAR files and execute
arbitrary JavaScript code in the context of another site.

For more information see vulnerability #11 in:
SA32693

10) An error exists when parsing E4X documents can be exploited to
inject arbitrary XML code.

For more information see vulnerability #12 in:
SA32693

The vulnerabilities are reported in versions prior to 3.0.4.

Solution:
Update to version 3.0.4.


CVE reference:

CVE-2008-0017
CVE-2008-5015
CVE-2008-5016
CVE-2008-5017
CVE-2008-5018
CVE-2008-5019
CVE-2008-5021
CVE-2008-5022
CVE-2008-5023
CVE-2008-5024

If you fix the vulnerability please also make sure to include the the CVE id in the changelog entry.


[1]http://secunia.com/advisories/32713/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkcOQkACgkQNxpp46476arZ+QCfZ9MG8NFbSAMAXKBnB/Lx5BWn
6woAoJ99q6HGzMo1XWDCrNh9swljrkO3
=U3tk
-----END PGP SIGNATURE-----





More information about the Secure-testing-team mailing list