SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Mozilla Firefox Vendors:   Mozilla.org
Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
SecurityTracker Alert ID:  1024605
SecurityTracker URL:  http://securitytracker.com/id/1024605
CVE Reference:   CVE-2010-3170, CVE-2010-3173, CVE-2010-3174, CVE-2010-3175, CVE-2010-3176, CVE-2010-3177, CVE-2010-3178, CVE-2010-3179, CVE-2010-3180, CVE-2010-3181, CVE-2010-3182, CVE-2010-3183   (Links to External Site)
Updated:  Oct 20 2010
Original Entry Date:  Oct 20 2010
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 3.5.14, 3.6 prior to 3.6.11
Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

A remote user can create specially crafted HTML that, when loaded by the target user, will trigger memory corruption errors and execute arbitrary code on the target system [CVE-2010-3174, CVE-2010-3175, CVE-2010-3176]. The code will run with the privileges of the target user.

A specially crafted 'document.write' call can trigger a stack memory error [CVE-2010-3179].

A use-after-free error in nsBarProp can trigger code execution [CVE-2010-3180].

A dangling pointer vulnerability in LookupGetterOrSetter() can trigger code execution [CVE-2010-3183].

Specially crafted Gopher content can cause JavaScript execution when converted to HTML tags [CVE-2010-3177].

A page that opens a new window and uses a javascript: URL to make a modal call can access information from a different domain [CVE-2010-3178].

When an SSL certificate is created with a common name containing a wildcard followed by a partial IP address, the browser can establish a valid SSL connection with a server with an IP address that matches the wildcard range [CVE-2010-3170].

The browser may load external libraries on Windows-based systems using a relative path, allowing a user to conduct binary planting attacks [CVE-2010-3181]. A script on Linux-based systems is also affected [CVE-2010-3182].

A server can use Diffie-Hellman Ephemeral mode (DHE) with too short of a minimum key length [CVE-2010-3173].

Paul Nickerson, Jesse Ruderman, Olli Pettay, Igor Bukanov, Josh Soref, Gary Kwong, Martijn Wargers, Siddharth Agarwal, Alexander Miller, Sergey Glazunov, regenrecht (via TippingPoint's Zero Day Initiative), Robert Swiecki, Eduardo Vela Nava, Richard Moore, Ehsan Akhgari, Dmitri Gribenko, and Nelson Bolyard reported these vulnerabilities.

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can conduct cross-site scripting attacks.

A remote user can obtain potentially sensitive information.

Solution:   The vendor has issued a fix (3.5.14, 3.6.11).

The vendor's advisories are available at:

http://www.mozilla.org/security/announce/2010/mfsa2010-64.html
http://www.mozilla.org/security/announce/2010/mfsa2010-65.html
http://www.mozilla.org/security/announce/2010/mfsa2010-66.html
http://www.mozilla.org/security/announce/2010/mfsa2010-67.html
http://www.mozilla.org/security/announce/2010/mfsa2010-68.html
http://www.mozilla.org/security/announce/2010/mfsa2010-69.html
http://www.mozilla.org/security/announce/2010/mfsa2010-70.html
http://www.mozilla.org/security/announce/2010/mfsa2010-71.html
http://www.mozilla.org/security/announce/2010/mfsa2010-72.html

Vendor URL:  www.mozilla.org/security/announce/2010/mfsa2010-64.html (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 20 2010 (Red Hat Issues Fix) Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
Red Hat has issued a fix for Red Hat Enterprise Linux 4 and 5.
Nov 11 2010 (Red Hat Issues Fix) Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
Red Hat has issued a fix for Red Hat Enterprise Linux 6.
Jan 10 2011 (Oracle Issues Fix) Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
Oracle has issued a fix for Solaris 10 and 11.
Aug 17 2011 (Oracle Issues Fix for Solaris) Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
Oracle has issued a fix for Solaris 9.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC