TITLE:
Mozilla Firefox Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA23282

VERIFY ADVISORY:
http://secunia.com/advisories/23282/

CRITICAL:
Highly critical

IMPACT:
Cross Site Scripting, Exposure of sensitive information, DoS, 
System
access

WHERE:
>From remote

SOFTWARE:
Mozilla Firefox 1.x
http://secunia.com/product/4227/
Mozilla Firefox 2.0.x
http://secunia.com/product/12434/

DESCRIPTION:
Multiple vulnerabilities have been reported in Mozilla Firefox, 
which
can be exploited by malicious people to gain knowledge of 
certain
information, conduct cross-site scripting attacks, and 
potentially
compromise a user's system.

1)Various errors in the layout engine and JavaScript engine can 
be
exploited to cause memory corruption and some may potentially 
allow
execution of arbitrary code.

2) An error when reducing the CPU's floating point precision, 
which
may happen on Windows when loading a plugin creating a Direct3D
device, may cause the "js_dtoa()" function to not exit and 
instead
cause a memory corruption.

3) A boundary error when setting the cursor to a Windows bitmap 
using
the CSS cursor property can be exploited to cause a heap-based 
buffer
overflow.

4) An unspecified error in the "watch()" JavaScript function 
can be
exploited to execute arbitrary code.

5) An error in LiveConnect causes an already freed object to be 
used
and may potentially allow execution of arbitrary code.

6) An error in the handling of the "src" attribute of IMG 
elements
loaded in a frame can be exploited to change the attribute to a
"javascript:" URI. This allows execution of arbitrary HTML and 
script
code in a user's browser session.

7) A memory corruption error within the SVG processing may 
allow
execution of arbitrary code by appending an SVG comment DOM 
node from
one document into another type of document (e.g. HTML).

8) The "Feed Preview" feature of Firefox 2.0 may leak 
feed-browsing
habits to websites when retrieving the icons of installed 
web-based
feed viewers.

9) A Function prototype regression in Firefox 2.0 can be 
exploited to
execute arbitrary HTML and script code in a user's browser 
session.

SOLUTION:
Update to version 1.5.0.9 or 2.0.0.1.

ORIGINAL ADVISORY:
Mozilla:
http://www.mozilla.org/security/announce/2006/mfsa2006-68.html
http://www.mozilla.org/security/announce/2006/mfsa2006-69.html
http://www.mozilla.org/security/announce/2006/mfsa2006-70.html
http://www.mozilla.org/security/announce/2006/mfsa2006-71.html
http://www.mozilla.org/security/announce/2006/mfsa2006-72.html
http://www.mozilla.org/security/announce/2006/mfsa2006-73.html
http://www.mozilla.org/security/announce/2006/mfsa2006-75.html
http://www.mozilla.org/security/announce/2006/mfsa2006-76.html
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to