Date: 10 September 2009
References: ESB-2009.1276 ESB-2009.1277 ESB-2009.1290 ESB-2009.1291 ESB-2009.1365 ESB-2010.0310 ESB-2010.0533
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT Security Bulletin
ASB-2009.1078
Firefox updates fix multiple vulnerabilities
10 September 2009
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Firefox
Operating System: UNIX variants (UNIX, Linux, OSX)
Windows
Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction
Denial of Service -- Remote with User Interaction
Provide Misleading Information -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2009-3069 CVE-2009-3070 CVE-2009-3071
CVE-2009-3072 CVE-2009-3073 CVE-2009-3074
CVE-2009-3075 CVE-2009-3076 CVE-2009-3077
CVE-2009-3078 CVE-2009-3079
Member content until: Saturday, October 10 2009
OVERVIEW
Mozilla has released 5 advisories relating to Firefox describing a
total of 11 vulnerabilities. Mozilla has rated 3 of these
advisories as "Critical", 1 as "Moderate" and 1 as "Low" impact.
IMPACT
According to Mozilla, the vulnerabilties corrected in this
update are:
o MFSA 2009-47 (CVE-2009-3069,CVE-2009-3070,CVE-2009-3071,
CVE-2009-3072,CVE-2009-3073,CVE-2009-3074,CVE-2009-3075): "Mozilla
developers and community members identified and fixed several
stability bugs in the browser engine used in Firefox and other
Mozilla-based products. Some of these crashes showed evidence of
memory corruption under certain circumstances and we presume that with
enough effort at least some of these could be exploited to run
arbitrary code." [1]
o MSFA 2009-48 (CVE-2009-3076): "...when security modules were added or
removed via pkcs11.addmodule or pkcs11.deletemodule, the resulting
dialog was not sufficiently informative. Without sufficient warning,
an attacker could entice a victim to install a malicious PKCS11
module and affect the cryptographic integrity of the victim's
browser." [2]
o MSFA 2009-49 (CVE-2009-3077): "...the columns of a XUL tree element
could be manipulated in a particular way which would leave a pointer
owned by the column pointing to freed memory. An attacker could
potentially use this vulnerability to crash a victim's browser and
run arbitrary code on the victim's computer." [3]
o MSFA 2009-50 (CVE-2009-3078): "...the default Windows font used to
render the locationbar and other text fields was improperly
displaying certain Unicode characters with tall line-height. In such
cases the tall line-height would cause the rest of the text in the
input field to be scrolled vertically out of view. An attacker could
use this vulnerability to prevent a user from seeing the URL of a
malicious site." [4]
o MSFA 2009-51 (CVE-2009-3079): "...the BrowserFeedWriter could be
leveraged to run JavaScript code from web content with elevated
privileges. Using this vulnerability, an attacker could construct
an object containing malicious JavaScript and cause the FeedWriter
to process the object, running the malicious code with chrome
privileges." [5]
MITIGATION
These vulnerabilities have been fixed in Firefox 3.5.3 and
Firefox 3.0.14. Updated versions of these programs are available from
the Mozilla web site. [6]
REFERENCES
[1] Mozilla Foundation Security Advisory 2009-47
http://www.mozilla.org/security/announce/2009/mfsa2009-47.html
[2] Mozilla Foundation Security Advisory 2009-48
http://www.mozilla.org/security/announce/2009/mfsa2009-48.html
[3] Mozilla Foundation Security Advisory 2009-49
http://www.mozilla.org/security/announce/2009/mfsa2009-49.html
[4] Mozilla Foundation Security Advisory 2009-50
http://www.mozilla.org/security/announce/2009/mfsa2009-50.html
[5] Mozilla Foundation Security Advisory 2009-51
http://www.mozilla.org/security/announce/2009/mfsa2009-51.html
[6] Mozilla Firefox web browser
http://www.mozilla.org/firefox
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFKqFpINVH5XJJInbgRAiehAJ0aM+aaKhh9OQb7cKjlIgyiYiwvcACeJCoV
b5PVsbYPbOUL6JED5gfa1m8=
=2xUS
-----END PGP SIGNATURE-----
|