copyright
|
disclaimer
|
privacy
|
contact
HOME
About
AusCERT
Membership
Contact Us
PKI Services
Training
Publications
Sec. Bulletins
Conferences
News & Media
Services
Web Log
Site Map
Site Help
Member login
Login »
Become a member »
Home
»
Security Bul...
»
By Operating...
»
UNIX (all)
»
BSD (all)
» AA-2007.0113 -- [Win][UNIX/Linux] -- Mozilla Firefox...
AA-2007.0113 -- [Win][UNIX/Linux] -- Mozilla Firefox 2.0.0.10 Released
Date:
31 December 2007
References
:
AA-2007.0114
Click here for printable version
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AA-2007.0113 AUSCERT Advisory [Win][UNIX/Linux] Mozilla Firefox 2.0.0.10 Released 31 December 2007 - --------------------------------------------------------------------------- AusCERT Advisory Summary ------------------------ Product: Mozilla Firefox Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact: Execute Arbitrary Code/Commands Cross-site Scripting Denial of Service Provide Misleading Information Access: Remote/Unauthenticated CVE Names: CVE-2007-5960 CVE-2007-5959 CVE-2007-5947 CVE-2007-6589 Member content until: Tuesday, December 25 2007 Original Bulletin: http://www.mozilla.org/security/announce/2007/mfsa2007-39.html http://www.mozilla.org/security/announce/2007/mfsa2007-38.html http://www.mozilla.org/security/announce/2007/mfsa2007-37.html Revision History: December 31 2007: Added CVE November 27 2007: Initial Release OVERVIEW: Several vulnerabilities in Mozilla Firefox have been addressed in the latest release 2.0.0.10. These vulnerabilities ranged from a DoS (Denial of Service) to the execution of arbitrary code. IMPACT: The following vulnerabilities exist in versions prior to 2.0.0.10: o CVE-2007-5960: "Mozilla Firefox before 2.0.0.10 and SeaMonkey 1.1.7 sets the Referer header to the window or frame in which script is running, instead of the address of the content that initiated the script, which allows remote attackers to spoof HTTP Referer headers and bypass Referer-based CSRF protection schemes by setting window.location and using a modal alert dialog that causes the wrong Referer to be sent." [1] o CVE-2007-5959: "Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger memory corruption." [2] o CVE-2007-5947: "The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI." [3] MITIGATION: Users can upgrade to the latest release by downloading the update from the Mozilla website. [4] REFERENCES: [1] National Vulnerability Database CVE-2007-5960 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5960 [2] National Vulnerability Database CVE-2007-5959 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5959 [3] National Vulnerability Database CVE-2007-5947 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5947 [4] Mozilla Firefox http://www.mozilla-europe.org/en/products/firefox/ AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBR3h9gyh9+71yA2DNAQJtuAP+JtfbxQ+xSJsvSxJH2Lfbwucb/hpURNTV SVcxCn7vt/00yThe0m4DkWS7zfXbXpWdGMLvUktYrYS3yYChmkUch1BICcWALsla GCHdrGIJx1NUpd2HEpPDyTKP9QAEGH22uDO1z1RINFwIgbhgO8Afu7rnVcEGPfQo xqhstnA5Chc= =4cPl -----END PGP SIGNATURE-----
Comments? Click here
http://www.auscert.org.au/render.html?cid=37&it=8420