SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Mozilla Firefox Vendors:   Mozilla.org
(Red Hat Issues Fix) Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1016604
SecurityTracker URL:  http://securitytracker.com/id/1016604
CVE Reference:   CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812   (Links to External Site)
Date:  Jul 29 2006
Impact:   Denial of service via network, Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.5.0.4 and prior versions
Description:   Several vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can execute arbitrary scripting code in the context of an arbitrary domain.

A remote user can create a specially crafted HTML that, when loaded by the target user, will cause the target user's browser to crash or execute arbitrary code. The code will run with the privileges of the target user.

A flaw in the processing of simultaneously XPCOM events may cause a deleted timer object to be used, causing the browser to crash or execute arbitrary code [MFSA 2006-46; CVE-2006-3113]. Firefox version 1.5.x is affected. Mozilla Suite is not affected. Thunderbird is affected if Javascript is enabled in mail. Secunia Research discovered this vulnerability.

A web page containing Java can reference the window.navigator object but change the object before Java is started to execute native code [MFSA 2006-45; CVE-2006-3677]. Firefox 1.0 and Mozilla Suite 1.7 are not affected. Thunderbird is not affected. TippingPoint reported this vulnerability.

The browser may not properly clear a JavaScript reference to a frame or window when the referenced content is deleted, allowing native code to be executed [MFSA 2006-44; CVE-2006-3801]. Firefox 1.0 and Mozilla Suite 1.7 are not affected. Thunderbird is affected if Javascript is enabled in mail. Thilo Girmann discovered this vulnerability.

A web page can hijack native DOM methods on a target document object in a different domain to cause arbitrary scripting code to run in the target domain [MFSA 2006-47; CVE-2006-3802]. Firefox 1.0 and Mozilla Suite 1.7 are not affected. Thunderbird is affected if Javascript is enabled in mail. Thor Larholm discovered this vulnerability.

A script can redefine the standard Object() constructor of a named Javascript function to return a reference to a privileged target object, allowing the script to execute with elevated privileges [MFSA 2006-51; CVE-2006-3807]. Thunderbird is affected if Javascript is enabled in mail. moz_bug_r_a4 discovered this vulnerability.

A race condition in Javascript garbage collection may cause a temporary variable to be deleted while still being used to create a new Function object [MFSA 2006-48; CVE-2006-3803]. This may allow a remote user to execute arbitrary code. Firefox 1.0 and Mozilla Suite 1.7 are not affected. Thunderbird is affected if Javascript is enabled in mail. H. D. Moore discovered this vulnerability.

Some garbage collection functions may delete temporary objects that are still in use, which may allow a remote user to execute arbitrary code [MFSA 2006-50; CVE-2006-3805]. Thunderbird is affected if Javascript is enabled in mail. Mozilla developers Igor Bukanov and shutdown discovered this vulnerability.

Some integer overflows can be triggered by long strings in the toSource() methods of the Object, Array, and String objects and string function arguments [MFSA 2006-50; CVE-2006-3806]. Thunderbird is affected if Javascript is enabled in mail. Mozilla developer Georgi Guninski discovered this vulnerability.

A Proxy AutoConfig (PAC) server can send a specially crafted PAC script that sets the required FindProxyForURL function to the eval method on a privileged object that has leaked into the PAC sandbox to execute code with elevated privileges [MFSA 2006-52; CVE-2006-3808]. moz_bug_r_a4 discovered this vulnerability.

A script that has been granted the UniversalBrowserRead privilege can gain UniversalXPConnect privileges [MFSA 2006-53; CVE-2006-3809]. Thunderbird is affected if Javascript is enabled in mail. Mozilla developer shutdown reported this vulnerability.

A remote user can invoke XPCNativeWrapper(window).Function(...) to create a function that can execute in a target window, permitting cross-site scripting attacks [MFSA 2006-54; CVE-2006-3810]. Firefox 1.0 and Mozilla Suite 1.7 are not affected. Thunderbird is affected if Javascript is enabled in mail. Mozilla developer shutdown reported this vulnerability.

A remote user can trigger any of several memory corruption errors, causing the target user's browser to crash or potentially execute arbitrary code [MFSA 2006-55; CVE-2006-3811]. Mozilla developers Boris Zbarsky, Darin Fisher, Daniel Veditz, Jesse Ruderman, and Martijn Wargers discovered these vulnerabilities.

A chrome URL can be made to reference remote files, which can run scripts with full privileges [MFSA 2006-56; CVE-2006-3812]. Benjamin Smedberg discovered this vulnerability.

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can execute arbitrary scripting code in the context of an arbitrary domain.

Solution:   Red Hat has released a fix.

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/firefox-1.5.0.5-0.el4.1.src.rpm
6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

ia64:
29ae3f60c50462267765855063edddf4 firefox-1.5.0.5-0.el4.1.ia64.rpm
a2e18536c14f09611d49276b9af8ffa8 firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm

ppc:
27c343290fd4c6fcf16323cd62f02e9b firefox-1.5.0.5-0.el4.1.ppc.rpm
be5c0e93af729117a3c7153e58d50183 firefox-debuginfo-1.5.0.5-0.el4.1.ppc.rpm

s390:
4be9436cc0d3cb1daee6f6962fb894ec firefox-1.5.0.5-0.el4.1.s390.rpm
4348ba2ef6e30a3e01137492373b6b11 firefox-debuginfo-1.5.0.5-0.el4.1.s390.rpm

s390x:
ddbb5e0ae4707724e08422de346aaedf firefox-1.5.0.5-0.el4.1.s390x.rpm
db4a001815e2c6096122248ae9a22a4b firefox-debuginfo-1.5.0.5-0.el4.1.s390x.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/firefox-1.5.0.5-0.el4.1.src.rpm
6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/firefox-1.5.0.5-0.el4.1.src.rpm
6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

ia64:
29ae3f60c50462267765855063edddf4 firefox-1.5.0.5-0.el4.1.ia64.rpm
a2e18536c14f09611d49276b9af8ffa8 firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/firefox-1.5.0.5-0.el4.1.src.rpm
6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

ia64:
29ae3f60c50462267765855063edddf4 firefox-1.5.0.5-0.el4.1.ia64.rpm
a2e18536c14f09611d49276b9af8ffa8 firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2006-0610.html

Vendor URL:  www.mozilla.com/firefox/ (Links to External Site)
Cause:   Access control error, Boundary error, State error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  4

Message History:   This archive entry is a follow-up to the message listed below.
Jul 27 2006 Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code



 Source Message Contents

Subject:  [RHSA-2006:0610-01] Critical: firefox security update


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Critical: firefox security update
Advisory ID:       RHSA-2006:0610-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2006-0610.html
Issue date:        2006-07-28
Updated on:        2006-07-28
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-2779 CVE-2006-2780 CVE-2006-2783 
                   CVE-2006-2782 CVE-2006-2778 CVE-2006-2776 
                   CVE-2006-2784 CVE-2006-2785 CVE-2006-2786 
                   CVE-2006-2787 CVE-2006-2788 CVE-2006-3801 
                   CVE-2006-3677 CVE-2006-3113 CVE-2006-3802 
                   CVE-2006-3803 CVE-2006-3805 CVE-2006-3806 
                   CVE-2006-3807 CVE-2006-3808 CVE-2006-3809 
                   CVE-2006-3810 CVE-2006-3811 CVE-2006-3812 
- ---------------------------------------------------------------------

1. Summary:

Updated firefox packages that fix several security bugs are now available
for Red Hat Enterprise Linux 4.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Mozilla Firefox is an open source Web browser.

The Mozilla Foundation has discontinued support for the Mozilla Firefox
1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in
Red Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox
1.5 branch.

This update also resolves a number of outstanding Firefox security issues:

Several flaws were found in the way Firefox processed certain javascript
actions. A malicious web page could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-2776,
CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,
CVE-2006-3812)

Several denial of service flaws were found in the way Firefox processed
certain web content. A malicious web page could crash the browser or
possibly execute arbitrary code as the user running Firefox.
(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,
CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)

A cross-site scripting flaw was found in the way Firefox processed
Unicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web
page could execute a script within the browser that a web input sanitizer
could miss due to a malformed "script" tag. (CVE-2006-2783)

Several flaws were found in the way Firefox processed certain javascript
actions. A malicious web page could conduct a cross-site scripting attack
or steal sensitive information (such as cookies owned by other domains).
(CVE-2006-3802, CVE-2006-3810)

A form file upload flaw was found in the way Firefox handled javascript
input object mutation. A malicious web page could upload an arbitrary local
file at form submission time without user interaction. (CVE-2006-2782)

A denial of service flaw was found in the way Firefox called the
crypto.signText() javascript function. A malicious web page could crash the
browser if the victim had a client certificate loaded. (CVE-2006-2778)

Two HTTP response smuggling flaws were found in the way Firefox processed
certain invalid HTTP response headers. A malicious web site could return
specially crafted HTTP response headers which may bypass HTTP proxy
restrictions. (CVE-2006-2786)

A flaw was found in the way Firefox processed Proxy AutoConfig scripts. A
malicious Proxy AutoConfig server could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-3808)

A double free flaw was found in the way the nsIX509::getRawDER method was
called. If a victim visited a carefully crafted web page, it was possible
to execute arbitrary code as the user running Firefox. (CVE-2006-2788)

Users of Firefox are advised to upgrade to this update, which contains
Firefox version 1.5.0.5 that corrects these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

193895 - CVE-2006-2779 multiple firefox DoS issues (CVE-2006-2780)
196973 - CVE-2006-2783 multiple Firefox issues (CVE-2006-2782,CVE-2006-2778,CVE-2006-2776,CVE-2006-2784,CVE-2006-2785,CVE-2006-2786,CVE-2006-2787,CVE-2006-2788)
200168 - CVE-2006-3801 Multiple Seamonkey issues (CVE-2006-3677, CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806,
 CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812)

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/firefox-1.5.0.5-0.el4.1.src.rpm
6b7faea0461d07518bd00000001a4bbe  firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a  firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907  firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

ia64:
29ae3f60c50462267765855063edddf4  firefox-1.5.0.5-0.el4.1.ia64.rpm
a2e18536c14f09611d49276b9af8ffa8  firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm

ppc:
27c343290fd4c6fcf16323cd62f02e9b  firefox-1.5.0.5-0.el4.1.ppc.rpm
be5c0e93af729117a3c7153e58d50183  firefox-debuginfo-1.5.0.5-0.el4.1.ppc.rpm

s390:
4be9436cc0d3cb1daee6f6962fb894ec  firefox-1.5.0.5-0.el4.1.s390.rpm
4348ba2ef6e30a3e01137492373b6b11  firefox-debuginfo-1.5.0.5-0.el4.1.s390.rpm

s390x:
ddbb5e0ae4707724e08422de346aaedf  firefox-1.5.0.5-0.el4.1.s390x.rpm
db4a001815e2c6096122248ae9a22a4b  firefox-debuginfo-1.5.0.5-0.el4.1.s390x.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b  firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf  firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/firefox-1.5.0.5-0.el4.1.src.rpm
6b7faea0461d07518bd00000001a4bbe  firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a  firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907  firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b  firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf  firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/firefox-1.5.0.5-0.el4.1.src.rpm
6b7faea0461d07518bd00000001a4bbe  firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a  firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907  firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

ia64:
29ae3f60c50462267765855063edddf4  firefox-1.5.0.5-0.el4.1.ia64.rpm
a2e18536c14f09611d49276b9af8ffa8  firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b  firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf  firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/firefox-1.5.0.5-0.el4.1.src.rpm
6b7faea0461d07518bd00000001a4bbe  firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a  firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907  firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

ia64:
29ae3f60c50462267765855063edddf4  firefox-1.5.0.5-0.el4.1.ia64.rpm
a2e18536c14f09611d49276b9af8ffa8  firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b  firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf  firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812
http://www.redhat.com/security/updates/classification/#critical

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFEyqjvXlSAg2UNWIIRAht1AJ9/F6OyTVsnPHg3L8cf/9cJVfWmcQCbB9PA
7Tf3o4tdkJLNwMai8JUDDkc=
=GX9n
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC