SECUNIA ADVISORY ID: SA34145
VERIFY ADVISORY: http://secunia.com/advisories/34145/
CRITICAL: Highly Critical
DESCRIPTION: Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, disclose sensitive information, or compromise a user's system. The vulnerabilities are reported in versions prior to 3.0.7.
1) Multiple errors in the layout and JavaScript engines can be exploited to corrupt memory and potentially execute arbitrary code.
2) An error in the garbage collection process when handling a set of cloned XUL DOM elements linked as a parent and child can be exploited to access freed memory and execute arbitrary code.
3) An error can be exploited via the "nsIRDFService" interface and a cross-domain redirect to bypass the same-origin policy and read XML data from another domain.
4) An error in libpng when handling out-of-memory conditions can be exploited to potentially execute arbitrary code. For more information: SA33970
5) An error when handling invisible control characters included in the location bar can be exploited to spoof a trusted URL.
SOLUTION: Update to version 3.0.7.
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Martijn Wargers, Jesse Ruderman, Josh Soref, Gary Kwong, and Timothee Groleau
2) an anonymous researcher, reported via ZDI
3) Georgi Guninski
5) Masahiro Yamada
ORIGINAL ADVISORY:
http://www.mozilla.org/security/announce/2009/mfsa2009-07.html
http://www.mozilla.org/security/announce/2009/mfsa2009-08.html
http://www.mozilla.org/security/announce/2009/mfsa2009-09.html
http://www.mozilla.org/security/announce/2009/mfsa2009-10.html
http://www.mozilla.org/security/announce/2009/mfsa2009-11.html
OTHER REFERENCES: SA33970: http://secunia.com/advisories/33970/
Mozilla Firefox Multiple VulnerabilitiesPosted on Thursday, March 05, 2009 @ 19:25:26 CST in Security |