copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

AA-2007.0114 -- [Win][UNIX/Linux] -- Netscape Multiple Vulnerabilities

Date: 29 November 2007
References: AA-2007.0113  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
AA-2007.0114                  AUSCERT Advisory

                             [Win][UNIX/Linux]
                     Netscape Multiple Vulnerabilities
                             29 November 2007
- ---------------------------------------------------------------------------

        AusCERT Advisory Summary
        ------------------------

Product:              Netscape Navigator
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact:               Execute Arbitrary Code/Commands
                      Cross-site Scripting
                      Denial of Service
                      Provide Misleading Information
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-5960 CVE-2007-5959 CVE-2007-5947
Member content until: Thursday, December 27 2007

Ref:                  AA-2007.0113

Original Bulletin:    http://browser.netscape.com/releasenotes/


OVERVIEW:

        Netscape has released version 9.0.0.4 to correct three security 
        bugs ranging from the execution of arbitrary code to cross site 
        scripting.


IMPACT:

        The security fixes for Mozilla Firefox have been included in this
        latest release of Netscape Navigator.

        The National Vulnerability Database [1], gives the following
        information regarding these vulnerabilities:

        o CVE-2007-5960:"Mozilla Firefox before 2.0.0.10 and SeaMonkey 
          1.1.7 sets the Referer header to the window or frame in which 
          script is running, instead of the address of the content that 
          initiated the script, which allows remote attackers to spoof 
          HTTP Referer headers and bypass Referer-based CSRF protection 
          schemes by setting window.location and using a modal alert 
          dialog that causes the wrong Referer to be sent." [2]

        o CVE-2007-5959:"Multiple unspecified vulnerabilities in Mozilla 
          Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 allow remote 
          attackers to cause a denial of service (crash) and possibly 
          execute arbitrary code via unknown vectors that trigger memory 
          corruption." [3]

        o CVE-2007-5947:"The jar protocol handler in Mozilla Firefox 
          retrieves the inner URL regardless of its MIME type, and 
          considers HTML documents within a jar archive to have the same 
          origin as the inner URL, which allows remote attackers to conduct 
          cross-site scripting (XSS) attacks via a jar: URI." [4]


MITIGATION:

        Navigator users can upgrade to the latest release via the 
        Netscape website. [5]


REFERENCES:

        [1] National Vulnerability Database
            http://nvd.nist.gov/

        [2] National Vulnerability Database (CVE-2007-5960)
            http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5960

        [3] National Vulnerability Database (CVE-2007-5959)
            http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5959

        [4] National Vulnerability Database (CVE-2007-5947)
            http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5947

        [5] Download Netscape Navigator
            http://browser.netscape.com/downloads/


AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBR04i3Ch9+71yA2DNAQKSWQP5Ad2HTX0Fkrp6F8zCB1iUIGwaqnvUQxmV
CDx+A8sigG1GDvhBf1CdftKc29dmaZ2+2wk5G6hBox9zC8SsJr2vMHX44w0lS53m
v2FZCCR/7DJtw1V0OR2RhU2kY6jCI3KERMa04zADz1pCYpK0Eh+xcpATr2KtIxrD
mdbVyYrqiQc=
=tBMK
-----END PGP SIGNATURE-----