copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

AL-2009.0015 -- [Win][UNIX/Linux] -- A number of vulnerabilities have been identified in Mozilla Firefox, SeaMonkey and Thunderbird

Date: 05 March 2009
References: ESB-2009.0194  ESB-2009.0199  ESB-2009.0202  ESB-2009.0204  ESB-2009.0220  ESB-2009.0262  ESB-2009.0381  ESB-2009.0459  ESB-2009.1038  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
A  U  S  C  E  R  T                                           A  L  E  R  T

                       AL-2009.0015 -- AUSCERT ALERT
                             [Win][UNIX/Linux]
        A number of vulnerabilities have been identified in Mozilla
                    Firefox, SeaMonkey and Thunderbird
                               5 March 2009

===========================================================================

        AusCERT Alert Summary
        ---------------------

Product:              Firefox 3.0.6
                      Thunderbird 2.0.0.21
                      SeaMonkey 1.1.15
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact:               Execute Arbitrary Code/Commands
                      Access Privileged Data
                      Provide Misleading Information
                      Denial of Service
CVE Names:            CVE-2009-0777 CVE-2009-0776 CVE-2009-0775
                      CVE-2009-0774 CVE-2009-0773 CVE-2009-0772
                      CVE-2009-0771 CVE-2009-0040
Member content until: Thursday, April 02 2009

Ref:                  ESB-2009.0194
                      ESB-2009.0199
                      ESB-2009.0202

OVERVIEW:

       Mozilla has released five advisories relating to Firefox,
       Thunderbird and Seamonkey. Mozilla has rated three of these 
       advisories as "Critical", one as "High", and one as "Low" impact.


IMPACT:

       According to Mozilla, the vulnerabilties corrected in this
       update are:

       o MFSA 2009-07(CVE-2009-0771, CVE-2009-0772, CVE-2009-0773, 
         CVE-2009-0774): "Mozilla developers identified and fixed several 
         stability bugs in the browser engine used in Firefox and other 
         Mozilla-based products. Some of these crashes showed evidence of 
         memory corruption under certain circumstances and we presume that 
         with enough effort at least some of these could be exploited to run 
         arbitrary code.

         Thunderbird shares the browser engine with Firefox and could be 
         vulnerable if JavaScript were to be enabled in mail. This is not 
         the default setting and we strongly discourage users from running 
         JavaScript in mail. Without further investigation we cannot rule out 
         the possibility that for some of these an attacker might be able to 
         prepare memory for exploitation through some means other than 
         JavaScript such as large images." [1]

       o MFSA 2009-08 (CVE-2009-0775): "An anonymous researcher, via 
         TippingPoint's Zero Day Initiative program, reported a vulnerability 
         in Mozilla's garbage collection process. The vulnerability was caused 
         by improper memory management of a set of cloned XUL DOM elements 
         which were linked as a parent and child. After reloading the browser 
         on a page with such linked elements, the browser would crash when 
         attempting to access an object which was already destroyed. An 
         attacker could use this crash to run arbitrary code on the victim's 
         computer.

         Thunderbird shares the browser engine with Firefox and could be 
         vulnerable if JavaScript were to be enabled in mail. This is not 
         the default setting and we strongly discourage users from running 
         JavaScript in mail." [2]

       o MFSA-2009-09 (CVE-2009-0776): "Mozilla security researcher Georgi 
         Guninski reported that a website could use nsIRDFService and a 
         cross-domain redirect to steal arbitrary XML data from another 
         domain, a violation of the same-origin policy. This vulnerability 
         could be used by a malicious website to steal private data from 
         users authenticated to the redirected website.

         Thunderbird shares the browser engine with Firefox and could be 
         vulnerable if JavaScript were to be enabled in mail. This is not 
         the default setting and we strongly discourage users from running 
         JavaScript in mail." [3]

       o MFSA-2009-10 (CVE-2009-0040): "libpng maintainer Glenn 
         Randers-Pehrson reported several memory safety hazards in PNG 
         libraries used by Mozilla. These vulnerabilities could be used by a 
         malicious website to crash a victim's browser and potentially 
         execute arbitrary code on their computer. libpng was upgraded to a 
         version which contained fixes for these flaws." [4]

       o MFSA-2009-11 (CVE-2009-0777): "Mozilla contributor Masahiro Yamada 
         reported that certain invisible control characters were being 
         decoded when displayed in the location bar, resulting in fewer 
         visible characters than were present in the actual location. An 
         attacker could use this vulnerability to spoof the location bar 
         and display a misleading URL for their malicious web page." [5]


MITIGATION:

       These vulnerabilities have been fixed in Firefox 3.0.7, Thunderbird 
       2.0.0.21 and SeaMonkey 1.1.15. At the time of this publication
       updates for Thunderbird and SeaMonkey have not yet been released, 
       however Firefox 3.0.7 can be downloaded from the Mozilla web site.


REFERENCES:

       [1] Mozilla Foundation Security Advisory 2009-07
           http://www.mozilla.org/security/announce/2009/mfsa2009-07.html
      
       [2] Mozilla Foundation Security Advisory 2009-08
           http://www.mozilla.org/security/announce/2009/mfsa2009-08.html

       [3] Mozilla Foundation Security Advisory 2009-09
           http://www.mozilla.org/security/announce/2009/mfsa2009-09.html

       [4] Mozilla Foundation Security Advisory 2009-10
           http://www.mozilla.org/security/announce/2009/mfsa2009-10.html

       [5] Mozilla Foundation Security Advisory 2009-11
           http://www.mozilla.org/security/announce/2009/mfsa2009-11.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFJrzTpNVH5XJJInbgRAjsHAJ48OmbAO8MS7xsZFhBb+ESiiG6iJwCfa2ZU
5v1VsOBpDl78juzLKij7SrA=
=TYnJ
-----END PGP SIGNATURE-----