![]() |
|
AA-2007.0113 -- [Win][UNIX/Linux] -- Mozilla Firefox 2.0.0.10 Released |
|
Date: 31 December 2007 Original URL: http://www.auscert.org.au/render.html?cid=37&it=8420 References: AA-2007.0114 Click here for PGP verifiable version -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AA-2007.0113 AUSCERT Advisory
[Win][UNIX/Linux]
Mozilla Firefox 2.0.0.10 Released
31 December 2007
- ---------------------------------------------------------------------------
AusCERT Advisory Summary
------------------------
Product: Mozilla Firefox
Operating System: UNIX variants (UNIX, Linux, OSX)
Windows
Impact: Execute Arbitrary Code/Commands
Cross-site Scripting
Denial of Service
Provide Misleading Information
Access: Remote/Unauthenticated
CVE Names: CVE-2007-5960 CVE-2007-5959 CVE-2007-5947
CVE-2007-6589
Member content until: Tuesday, December 25 2007
Original Bulletin:
http://www.mozilla.org/security/announce/2007/mfsa2007-39.html
http://www.mozilla.org/security/announce/2007/mfsa2007-38.html
http://www.mozilla.org/security/announce/2007/mfsa2007-37.html
Revision History: December 31 2007: Added CVE
November 27 2007: Initial Release
OVERVIEW:
Several vulnerabilities in Mozilla Firefox have been addressed in
the latest release 2.0.0.10. These vulnerabilities ranged from a
DoS (Denial of Service) to the execution of arbitrary code.
IMPACT:
The following vulnerabilities exist in versions prior to 2.0.0.10:
o CVE-2007-5960: "Mozilla Firefox before 2.0.0.10 and SeaMonkey
1.1.7 sets the Referer header to the window or frame in which
script is running, instead of the address of the content that
initiated the script, which allows remote attackers to spoof HTTP
Referer headers and bypass Referer-based CSRF protection schemes
by setting window.location and using a modal alert dialog that
causes the wrong Referer to be sent." [1]
o CVE-2007-5959: "Multiple unspecified vulnerabilities in Mozilla
Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 allow remote
attackers to cause a denial of service (crash) and possibly
execute arbitrary code via unknown vectors that trigger memory
corruption." [2]
o CVE-2007-5947: "The jar protocol handler in Mozilla Firefox
retrieves the inner URL regardless of its MIME type, and considers
HTML documents within a jar archive to have the same origin as the
inner URL, which allows remote attackers to conduct cross-site
scripting (XSS) attacks via a jar: URI." [3]
MITIGATION:
Users can upgrade to the latest release by downloading the update
from the Mozilla website. [4]
REFERENCES:
[1] National Vulnerability Database CVE-2007-5960
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5960
[2] National Vulnerability Database CVE-2007-5959
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5959
[3] National Vulnerability Database CVE-2007-5947
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5947
[4] Mozilla Firefox
http://www.mozilla-europe.org/en/products/firefox/
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBR3h9gyh9+71yA2DNAQJtuAP+JtfbxQ+xSJsvSxJH2Lfbwucb/hpURNTV
SVcxCn7vt/00yThe0m4DkWS7zfXbXpWdGMLvUktYrYS3yYChmkUch1BICcWALsla
GCHdrGIJx1NUpd2HEpPDyTKP9QAEGH22uDO1z1RINFwIgbhgO8Afu7rnVcEGPfQo
xqhstnA5Chc=
=4cPl
-----END PGP SIGNATURE-----
|