[PCWorks] Firefox Multiple Vulnerabilities

  • From: "Clint Hamilton-PCWorks Admin" <PCWorks@xxxxxxxxxxxxxxxxxxxxxxxx>
  • To: "PCWorks@xxxxxxxxxxxxx" <pcworks@xxxxxxxxxxxxx>
  • Date: Sat, 12 Sep 2009 00:51:54 -0500

TITLE:
Mozilla Firefox Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA36671

VERIFY ADVISORY:
http://secunia.com/advisories/36671/

DESCRIPTION:
Some vulnerabilities have been reported in Mozilla Firefox, 
which can
be exploited by malicious people to bypass certain security
restrictions, conduct spoofing attacks, or compromise a 
vulnerable
system.

1) Multiple errors in the browser and JavaScript engines can be
exploited to corrupt memory.

Successful exploitation may allow execution of arbitrary code.

2) The warning dialog displayed when adding or removing 
security
modules via pkcs11.addmodule or pkcs11.deletemodule does not 
contain
enough information. This can be exploited to potentially trick 
a user
into installing a malicious PKCS11 module.

NOTE: This vulnerability does not affect 3.5.x versions.

3) An error exists when processing operations performed on the
columns of a XUL tree element. This can be exploited to 
dereference
freed memory via a pointer owned by a column of the XUL tree
element.

Successful exploitation of this vulnerability may allow 
execution of
arbitrary code.

4) An error exists when displaying text in the location bar 
using the
default Windows font. This can be exploited to spoof the URL of 
a
trusted site via Unicode characters having a tall line-height.

5) An error in the implementation of the "BrowserFeedWriter" 
object
can be exploited to execute arbitrary JavaScript code with 
chrome
privileges.

SOLUTION:
Update to version 3.0.14 or 3.5.3.

ORIGINAL ADVISORY:
Mozilla Foundation:
http://www.mozilla.org/security/announce/2009/mfsa2009-47.html
http://www.mozilla.org/security/announce/2009/mfsa2009-48.html
http://www.mozilla.org/security/announce/2009/mfsa2009-49.html
http://www.mozilla.org/security/announce/2009/mfsa2009-50.html
http://www.mozilla.org/security/announce/2009/mfsa2009-51.html

ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-09-065/

Dan Kaminsky:
http://archives.neohapsis.com/archives/fulldisclosure/2009-09/0142.html

=========================
The list's FAQ's can be seen by sending an email to 
PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line.

To unsubscribe, subscribe, set Digest or Vacation to on or off, go to 
//www.freelists.org/list/pcworks .  You can also send an email to 
PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line.  Your 
member list settings can be found at 
//www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks .  Once logged in, you have 
access to numerous other email options.  

The list archives are located at //www.freelists.org/archives/pcworks/ .  
All email posted to the list will be placed there in the event anyone needs to 
look for previous posts.
-zxdjhu-

Other related posts: