<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> <glsa id="200509-11"> <title>Mozilla Suite, Mozilla Firefox: Multiple vulnerabilities</title> <synopsis> Mozilla Suite and Firefox are vulnerable to multiple issues, including some that might be exploited to execute arbitrary code. </synopsis> <product type="ebuild">mozilla</product> <announced>2005-09-18</announced> <revised count="02">2005-09-29</revised> <bug>105396</bug> <access>remote</access> <affected> <package name="www-client/mozilla-firefox" auto="yes" arch="*"> <unaffected range="ge">1.0.7-r2</unaffected> <vulnerable range="lt">1.0.7-r2</vulnerable> </package> <package name="www-client/mozilla" auto="yes" arch="*"> <unaffected range="ge">1.7.12-r2</unaffected> <vulnerable range="lt">1.7.12-r2</vulnerable> </package> <package name="www-client/mozilla-firefox-bin" auto="yes" arch="*"> <unaffected range="ge">1.0.7</unaffected> <vulnerable range="lt">1.0.7</vulnerable> </package> <package name="www-client/mozilla-bin" auto="yes" arch="*"> <unaffected range="ge">1.7.12</unaffected> <vulnerable range="lt">1.7.12</vulnerable> </package> <package name="net-libs/gecko-sdk" auto="yes" arch="*"> <unaffected range="ge">1.7.12</unaffected> <vulnerable range="lt">1.7.12</vulnerable> </package> </affected> <background> <p> The Mozilla Suite is a popular all-in-one web browser that includes a mail and news reader. Mozilla Firefox is the next-generation browser from the Mozilla project. Gecko is the layout engine used in both products. </p> </background> <description> <p> The Mozilla Suite and Firefox are both vulnerable to the following issues: </p> <ul> <li>Tom Ferris reported a heap overflow in IDN-enabled browsers with malicious Host: headers (CAN-2005-2871).</li> <li>"jackerror" discovered a heap overrun in XBM image processing (CAN-2005-2701).</li> <li>Mats Palmgren reported a potentially exploitable stack corruption using specific Unicode sequences (CAN-2005-2702).</li> <li>Georgi Guninski discovered an integer overflow in the JavaScript engine (CAN-2005-2705)</li> <li>Other issues ranging from DOM object spoofing to request header spoofing were also found and fixed in the latest versions (CAN-2005-2703, CAN-2005-2704, CAN-2005-2706, CAN-2005-2707).</li> </ul> <p> The Gecko engine in itself is also affected by some of these issues and has been updated as well. </p> </description> <impact type="normal"> <p> A remote attacker could setup a malicious site and entice a victim to visit it, potentially resulting in arbitrary code execution with the victim's privileges or facilitated spoofing of known websites. </p> </impact> <workaround> <p> There is no known workaround for all the issues. </p> </workaround> <resolution> <p> All Mozilla Firefox users should upgrade to the latest version: </p> <code> # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.7-r2"</code> <p> All Mozilla Suite users should upgrade to the latest version: </p> <code> # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.12-r2"</code> <p> All Mozilla Firefox binary users should upgrade to the latest version: </p> <code> # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.7"</code> <p> All Mozilla Suite binary users should upgrade to the latest version: </p> <code> # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.12"</code> <p> All Gecko library users should upgrade to the latest version: </p> <code> # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/gecko-sdk-1.7.12"</code> <p> </p> </resolution> <references> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2701">CAN-2005-2701</uri> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2702">CAN-2005-2702</uri> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2703">CAN-2005-2703</uri> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2704">CAN-2005-2704</uri> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2705">CAN-2005-2705</uri> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2706">CAN-2005-2706</uri> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2707">CAN-2005-2707</uri> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2871">CAN-2005-2871</uri> <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Foundation Security Advisories</uri> </references> <metadata tag="submitter" timestamp="2005-09-15T12:38:09Z"> koon </metadata> <metadata tag="bugReady" timestamp="2005-09-18T09:17:15Z"> koon </metadata> </glsa>