Mozilla Firefox Multiple Vulnerabilities

Posted on Wednesday, February 04, 2009 @ 23:24:26 PST in Security
by Raven

SECUNIA ADVISORY ID: SA33799

VERIFY ADVISORY: http://secunia.com/advisories/33799/

CRITICAL: Highly critical

IMPACT: Security Bypass, Cross Site Scripting, Exposure of system information, Exposure of sensitive information, System access

SOFTWARE: Mozilla Firefox 3.x - http://secunia.com/advisories/product/19089/

DESCRIPTION: Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to potentially disclose sensitive information, and by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, disclose sensitive information, or potentially to compromise a user's system.


1) Multiple errors in the layout engine can be exploited to cause memory corruptions and potentially execute arbitrary code.
2) Multiple errors in the Javascript engine can be exploited to cause memory corruptions and potentially execute arbitrary code.
3) A chrome XBL method can be used in combination with "window.eval" to execute arbitrary Javascript code in the context of another web site
4) An error when restoring a closed tab can be exploited to modify an input control's text value, which allows e.g. to disclose the content of a local file when a user re-opens a tab.
5) An error in the processing of shortcut files can be exploited to execute arbitrary script code with chrome privileges e.g. via an HTML file that loads a privileged chrome document via a .desktop shortcut file.

This is related to: SA32192

6) A security issue is caused due to cookies marked "HTTPOnly" being readable by Javascript via the "XMLHttpRequest.getResponseHeader" and "XMLHttpRequest.getAllResponseHeaders" APIs.
7) A security issue is caused due to Firefox ignoring certain HTTP directives to not cache web pages ("Cache-Control: no-store" and "Cache-Control: no-cache" for HTTPS pages), which can be exploited to disclose potentially sensitive information via cached pages.
br /> SOLUTION: Update to version 3.0.6.

PROVIDED AND/OR DISCOVERED BY: The vendor credits:
1) Jesse Ruderman, Georgi Guninski, and Martijn Wargers
2) Gary Kwong
3, 4) moz_bug_r_a4
5) Georgi Guninski
6) Wladimir Palant
7) Paul Nel

ORIGINAL ADVISORY: Mozilla Foundation:
http://www.mozilla.org/security/announce/2009/mfsa2009-01.html
http://www.mozilla.org/security/announce/2009/mfsa2009-02.html
http://www.mozilla.org/security/announce/2009/mfsa2009-03.html
http://www.mozilla.org/security/announce/2009/mfsa2009-04.html
http://www.mozilla.org/security/announce/2009/mfsa2009-05.html
http://www.mozilla.org/security/announce/2009/mfsa2009-06.html

OTHER REFERENCES: SA32192: http://secunia.com/advisories/32192/
 
 
click Related        click Share
 
News ©

Site Info v2.2.2

Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 346,388,727
  • Today: 43,731
Server InfoServer Info
  • Jan 22, 2018
  • 08:21 pm PST
 
 

Daily Inspiration