copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

AA-2007.0113 -- [Win][UNIX/Linux] -- Mozilla Firefox 2.0.0.10 Released

Date: 31 December 2007
References: AA-2007.0114  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
AA-2007.0113                  AUSCERT Advisory

                             [Win][UNIX/Linux]
                     Mozilla Firefox 2.0.0.10 Released
                             31 December 2007
- ---------------------------------------------------------------------------

        AusCERT Advisory Summary
        ------------------------

Product:              Mozilla Firefox
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact:               Execute Arbitrary Code/Commands
                      Cross-site Scripting
                      Denial of Service
                      Provide Misleading Information
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-5960 CVE-2007-5959 CVE-2007-5947
                      CVE-2007-6589
Member content until: Tuesday, December 25 2007

Original Bulletin:  
  http://www.mozilla.org/security/announce/2007/mfsa2007-39.html
  http://www.mozilla.org/security/announce/2007/mfsa2007-38.html
  http://www.mozilla.org/security/announce/2007/mfsa2007-37.html

Revision History:     December 31 2007: Added CVE
                      November 27 2007: Initial Release

OVERVIEW:

       Several vulnerabilities in Mozilla Firefox have been addressed in 
       the latest release 2.0.0.10. These vulnerabilities ranged from a 
       DoS (Denial of Service) to the execution of arbitrary code.


IMPACT:

       The following vulnerabilities exist in versions prior to 2.0.0.10:

       o CVE-2007-5960: "Mozilla Firefox before 2.0.0.10 and SeaMonkey 
         1.1.7 sets the Referer header to the window or frame in which 
         script is running, instead of the address of the content that 
         initiated the script, which allows remote attackers to spoof HTTP 
         Referer headers and bypass Referer-based CSRF protection schemes 
         by setting window.location and using a modal alert dialog that 
         causes the wrong Referer to be sent." [1]

       o CVE-2007-5959: "Multiple unspecified vulnerabilities in Mozilla 
         Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 allow remote 
         attackers to cause a denial of service (crash) and possibly 
         execute arbitrary code via unknown vectors that trigger memory 
         corruption." [2]

       o CVE-2007-5947: "The jar protocol handler in Mozilla Firefox 
         retrieves the inner URL regardless of its MIME type, and considers 
         HTML documents within a jar archive to have the same origin as the 
         inner URL, which allows remote attackers to conduct cross-site 
         scripting (XSS) attacks via a jar: URI." [3]


MITIGATION:

        Users can upgrade to the latest release by downloading the update
        from the Mozilla website. [4]


REFERENCES:

        [1] National Vulnerability Database CVE-2007-5960
            http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5960

        [2] National Vulnerability Database CVE-2007-5959
            http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5959

        [3] National Vulnerability Database CVE-2007-5947
            http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5947
    
        [4] Mozilla Firefox
            http://www.mozilla-europe.org/en/products/firefox/

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBR3h9gyh9+71yA2DNAQJtuAP+JtfbxQ+xSJsvSxJH2Lfbwucb/hpURNTV
SVcxCn7vt/00yThe0m4DkWS7zfXbXpWdGMLvUktYrYS3yYChmkUch1BICcWALsla
GCHdrGIJx1NUpd2HEpPDyTKP9QAEGH22uDO1z1RINFwIgbhgO8Afu7rnVcEGPfQo
xqhstnA5Chc=
=4cPl
-----END PGP SIGNATURE-----