TITLE:
Mozilla Firefox Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA19873

VERIFY ADVISORY:
http://secunia.com/advisories/19873/

CRITICAL:
Highly critical

IMPACT:
Cross Site Scripting, DoS, System access

WHERE:
>From remote

SOFTWARE:
Mozilla Firefox 1.x
http://secunia.com/product/4227/
Mozilla Firefox 0.x
http://secunia.com/product/3256/

DESCRIPTION:
Multiple vulnerabilities have been reported in Mozilla Firefox, 
which
can be exploited by malicious people to conduct cross-site 
scripting
attacks or compromise a user's system.

1) An error within the handling of JavaScript references to 
frames
and windows may in certain circumstances result in the 
reference not
being properly cleared and allows execution of arbitrary code.

The vulnerability only affects the 1.5 branch.

2) An error within the handling of Java references to 
properties of
the window.navigator object allows execution of arbitrary code 
if a
web page replaces the navigator object before starting Java.

The vulnerability only affects the 1.5 branch.

3) A memory corruption error within the handling of 
simultaneously
happening XPCOM events results in the use of a deleted timer 
object
and allows execution of arbitrary code.

The vulnerability only affects the 1.5 branch.

4) Insufficient access checks on standard DOM methods of the
top-level document object (e.g. "document.getElementById()") 
can be
exploited by a malicious web site to execute arbitrary script 
code in
the context of another site.

The vulnerability only affects the 1.5 branch.

5) A race condition where JavaScript garbage collection deletes 
a
temporary variable still being used in the creation of a new 
Function
object may allow execution of arbitrary code.

The vulnerability only affects the 1.5 branch.

6) Various errors in the JavaScript engine during garbage 
collection
where used pointers are deleted and integer overflows when 
handling
long strings e.g. passed to the "toSource()" methods of the 
Object,
Array, and String objects may allow execution of arbitrary 
code.

7) Named JavaScript functions have a parent object created 
using the
standard "Object()" constructor, which can be redefined by 
script.
This can be exploited to run script code with elevated 
privileges if
the "Object()" constructor returns a reference to a privileged
object.

8) An error within the handling of PAC script can be exploited 
by a
malicious Proxy AutoConfig (PAC) server to execute script code 
with
escalated privileges by setting the FindProxyForURL function to 
the
eval method on a privileged object that has leaked into the PAC
sandbox.

9) An error within the handling of scripts granted the
"UniversalBrowserRead" privilege can be exploited to execute 
script
code with escalated privileges equivalent to 
"UniversalXPConnect".

10) An error can be exploited to execute arbitary script code 
in
context of another site by using the
"XPCNativeWrapper(window).Function(...)" construct, which 
creates a
function that appears to belong to another site.

The vulnerability only affects the 1.5 branch.

11) A memory corruption error when calling
"nsListControlFrame::FireMenuItemActiveEvent()", some potential
string class buffer overflows, a memory corruption error when
anonymous box selectors are outside of UA stylesheets, 
references to
removed nodes, errors involving table row and column groups, 
and an
error in "crypto.generateCRMFRequest" callback may potentially 
be
exploited to execute arbitrary code.

12) An error within the handling of "chrome:" URI's can be 
exploited
to reference remote files that can run scripts with full 
privileges.

SOLUTION:
Update to version 1.5.0.5.
http://www.mozilla.com/firefox/

ORIGINAL ADVISORY:
Mozilla.org:
http://www.mozilla.org/security/announce/2006/mfsa2006-44.html
http://www.mozilla.org/security/announce/2006/mfsa2006-45.html
http://www.mozilla.org/security/announce/2006/mfsa2006-46.html
http://www.mozilla.org/security/announce/2006/mfsa2006-47.html
http://www.mozilla.org/security/announce/2006/mfsa2006-48.html
http://www.mozilla.org/security/announce/2006/mfsa2006-50.html
http://www.mozilla.org/security/announce/2006/mfsa2006-51.html
http://www.mozilla.org/security/announce/2006/mfsa2006-52.html
http://www.mozilla.org/security/announce/2006/mfsa2006-53.html
http://www.mozilla.org/security/announce/2006/mfsa2006-54.html
http://www.mozilla.org/security/announce/2006/mfsa2006-55.html
http://www.mozilla.org/security/announce/2006/mfsa2006-56.html

Secunia Research:
http://secunia.com/secunia_research/2006-53/

ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-06-025.html
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to