TITLE:
Mozilla Firefox Three Vulnerabilities

SECUNIA ADVISORY ID:
SA14654

VERIFY ADVISORY:
http://secunia.com/advisories/14654/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, System access

WHERE:
>From remote

SOFTWARE:
Mozilla Firefox 1.x
http://secunia.com/product/4227/
Mozilla Firefox 0.x
http://secunia.com/product/3256/

DESCRIPTION:
Three vulnerabilities have been reported in Firefox, which can 
be
exploited by malicious people to bypass certain security 
restrictions
and compromise a user's system.

1) An error in the restriction of privileged XUL files can e.g. 
be
exploited to open a local privileged XUL file by tricking a 
user into
dragging a faked scrollbar.

The vulnerability itself does not pose any direct security risk 
as no
XUL files in the product use external parameters in an insecure 
way
nor do any destructive actions when being opened.

2) A web site added as a sidebar panel can load privileged 
content,
which can be exploited to execute arbitrary programs by 
injecting
JavaScript into a privileged URL.

3) A boundary error in the GIF image processing of Netscape 
extension
2 blocks can be exploited to cause a heap-based buffer overflow 
via a
specially crafted image.

Successful exploitation may allow execution of arbitrary code.

The vulnerabilities have been reported in versions prior to 
1.0.2.

SOLUTION:
Update to version 1.0.2.
http://www.mozilla.org/products/firefox/

ORIGINAL ADVISORY:
1) Mozilla:
http://www.mozilla.org/security/announce/mfsa2005-32.html

2) Mozilla:
http://www.mozilla.org/security/announce/mfsa2005-31.html

3) Mozilla:
http://www.mozilla.org/security/announce/mfsa2005-30.html

ISS:
http://xforce.iss.net/xforce/alerts/id/191
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to