Ravens PHP Scripts

Mozilla Firefox Multiple Vulnerabilities
Date: Thursday, March 05, 2009 @ 20:25:26 CET
Topic: Security


SECUNIA ADVISORY ID: SA34145

VERIFY ADVISORY: http://secunia.com/advisories/34145/

CRITICAL: Highly Critical

DESCRIPTION: Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, disclose sensitive information, or compromise a user's system. The vulnerabilities are reported in versions prior to 3.0.7.




1) Multiple errors in the layout and JavaScript engines can be exploited to corrupt memory and potentially execute arbitrary code.
2) An error in the garbage collection process when handling a set of cloned XUL DOM elements linked as a parent and child can be exploited to access freed memory and execute arbitrary code.
3) An error can be exploited via the "nsIRDFService" interface and a cross-domain redirect to bypass the same-origin policy and read XML data from another domain.
4) An error in libpng when handling out-of-memory conditions can be exploited to potentially execute arbitrary code. For more information: SA33970
5) An error when handling invisible control characters included in the location bar can be exploited to spoof a trusted URL.

SOLUTION: Update to version 3.0.7.

PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Martijn Wargers, Jesse Ruderman, Josh Soref, Gary Kwong, and Timothee Groleau
2) an anonymous researcher, reported via ZDI
3) Georgi Guninski
5) Masahiro Yamada

ORIGINAL ADVISORY:
http://www.mozilla.org/security/announce/2009/mfsa2009-07.html
http://www.mozilla.org/security/announce/2009/mfsa2009-08.html
http://www.mozilla.org/security/announce/2009/mfsa2009-09.html
http://www.mozilla.org/security/announce/2009/mfsa2009-10.html
http://www.mozilla.org/security/announce/2009/mfsa2009-11.html

OTHER REFERENCES: SA33970: http://secunia.com/advisories/33970/






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=3567