Date: 29 November 2007
References: AA-2007.0113
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AA-2007.0114 AUSCERT Advisory
[Win][UNIX/Linux]
Netscape Multiple Vulnerabilities
29 November 2007
- ---------------------------------------------------------------------------
AusCERT Advisory Summary
------------------------
Product: Netscape Navigator
Operating System: UNIX variants (UNIX, Linux, OSX)
Windows
Impact: Execute Arbitrary Code/Commands
Cross-site Scripting
Denial of Service
Provide Misleading Information
Access: Remote/Unauthenticated
CVE Names: CVE-2007-5960 CVE-2007-5959 CVE-2007-5947
Member content until: Thursday, December 27 2007
Ref: AA-2007.0113
Original Bulletin: http://browser.netscape.com/releasenotes/
OVERVIEW:
Netscape has released version 9.0.0.4 to correct three security
bugs ranging from the execution of arbitrary code to cross site
scripting.
IMPACT:
The security fixes for Mozilla Firefox have been included in this
latest release of Netscape Navigator.
The National Vulnerability Database [1], gives the following
information regarding these vulnerabilities:
o CVE-2007-5960:"Mozilla Firefox before 2.0.0.10 and SeaMonkey
1.1.7 sets the Referer header to the window or frame in which
script is running, instead of the address of the content that
initiated the script, which allows remote attackers to spoof
HTTP Referer headers and bypass Referer-based CSRF protection
schemes by setting window.location and using a modal alert
dialog that causes the wrong Referer to be sent." [2]
o CVE-2007-5959:"Multiple unspecified vulnerabilities in Mozilla
Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 allow remote
attackers to cause a denial of service (crash) and possibly
execute arbitrary code via unknown vectors that trigger memory
corruption." [3]
o CVE-2007-5947:"The jar protocol handler in Mozilla Firefox
retrieves the inner URL regardless of its MIME type, and
considers HTML documents within a jar archive to have the same
origin as the inner URL, which allows remote attackers to conduct
cross-site scripting (XSS) attacks via a jar: URI." [4]
MITIGATION:
Navigator users can upgrade to the latest release via the
Netscape website. [5]
REFERENCES:
[1] National Vulnerability Database
http://nvd.nist.gov/
[2] National Vulnerability Database (CVE-2007-5960)
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5960
[3] National Vulnerability Database (CVE-2007-5959)
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5959
[4] National Vulnerability Database (CVE-2007-5947)
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5947
[5] Download Netscape Navigator
http://browser.netscape.com/downloads/
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBR04i3Ch9+71yA2DNAQKSWQP5Ad2HTX0Fkrp6F8zCB1iUIGwaqnvUQxmV
CDx+A8sigG1GDvhBf1CdftKc29dmaZ2+2wk5G6hBox9zC8SsJr2vMHX44w0lS53m
v2FZCCR/7DJtw1V0OR2RhU2kY6jCI3KERMa04zADz1pCYpK0Eh+xcpATr2KtIxrD
mdbVyYrqiQc=
=tBMK
-----END PGP SIGNATURE-----
|