Im not sure if this topic is suited in plug.
anyway just to inform plug users.


* Technical Description *

Several vulnerabilities were identified in Mozilla Suite, Firefox and
Thunderbird, which may be exploited by attackers to execute arbitrary
commands or bypass certain security features.

- The first vulnerability is due to a heap overrun error when
processing a Netscape-specific extension block in GIF images, which
may be exploited to run arbitrary code on a vulnerable system via a
web page or email message containing a specially crafted GIF image.

- The second flaw occurs if a user bookmarked a specially crafted page
as a Firefox sidebar panel, which could be exploited to execute
arbitrary programs by opening a privileged page and injecting
javascript into it.

- The third issue occurs when handling specially crafted XUL files,
and may be exploited to bypass the restriction on opening privileged
XUL.

 * Affected Products *

Mozilla Firefox version 1.0.1 and prior
Mozilla Suite version 1.7.5 and prior
Mozilla Thunderbird version 1.0.1 and prior

 * Solution *

Mozilla Firefox version 1.0.2
Mozilla Suite version 1.7.6
Mozilla Thunderbird version 1.0.2

 * References *

http://www.k-otik.com/english/advisories/2005/0296
https://bugzilla.mozilla.org/show_bug.cgi?id=284627
https://bugzilla.mozilla.org/show_bug.cgi?id=285595
https://bugzilla.mozilla.org/show_bug.cgi?id=285438

-- 

"mailing lists is my personal knowledgebase"
--
Philippine Linux Users' Group (PLUG) Mailing List
plug@lists.q-linux.com (#PLUG @ irc.free.net.ph)
Official Website: http://plug.linux.org.ph
Searchable Archives: http://marc.free.net.ph
.
To leave, go to http://lists.q-linux.com/mailman/listinfo/plug
.
Are you a Linux newbie? To join the newbie list, go to
http://lists.q-linux.com/mailman/listinfo/ph-linux-newbie

Reply via email to