<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200509-11">
  <title>Mozilla Suite, Mozilla Firefox: Multiple vulnerabilities</title>
  <synopsis>
    Mozilla Suite and Firefox are vulnerable to multiple issues, including some
    that might be exploited to execute arbitrary code.
  </synopsis>
  <product type="ebuild">mozilla</product>
  <announced>2005-09-18</announced>
  <revised count="02">2005-09-29</revised>
  <bug>105396</bug>
  <access>remote</access>
  <affected>
    <package name="www-client/mozilla-firefox" auto="yes" arch="*">
      <unaffected range="ge">1.0.7-r2</unaffected>
      <vulnerable range="lt">1.0.7-r2</vulnerable>
    </package>
    <package name="www-client/mozilla" auto="yes" arch="*">
      <unaffected range="ge">1.7.12-r2</unaffected>
      <vulnerable range="lt">1.7.12-r2</vulnerable>
    </package>
    <package name="www-client/mozilla-firefox-bin" auto="yes" arch="*">
      <unaffected range="ge">1.0.7</unaffected>
      <vulnerable range="lt">1.0.7</vulnerable>
    </package>
    <package name="www-client/mozilla-bin" auto="yes" arch="*">
      <unaffected range="ge">1.7.12</unaffected>
      <vulnerable range="lt">1.7.12</vulnerable>
    </package>
    <package name="net-libs/gecko-sdk" auto="yes" arch="*">
      <unaffected range="ge">1.7.12</unaffected>
      <vulnerable range="lt">1.7.12</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    The Mozilla Suite is a popular all-in-one web browser that includes a
    mail and news reader. Mozilla Firefox is the next-generation browser
    from the Mozilla project. Gecko is the layout engine used in both
    products.
    </p>
  </background>
  <description>
    <p>
    The Mozilla Suite and Firefox are both vulnerable to the following
    issues:
    </p>
    <ul>
    <li>Tom Ferris reported a heap overflow in IDN-enabled browsers with
    malicious Host: headers (CAN-2005-2871).</li>
    <li>"jackerror" discovered a heap overrun in XBM image processing
    (CAN-2005-2701).</li>
    <li>Mats Palmgren reported a potentially exploitable stack corruption
    using specific Unicode sequences (CAN-2005-2702).</li>
    <li>Georgi Guninski discovered an integer overflow in the JavaScript
    engine (CAN-2005-2705)</li>
    <li>Other issues ranging from DOM object spoofing to request header
    spoofing were also found and fixed in the latest versions
    (CAN-2005-2703, CAN-2005-2704, CAN-2005-2706, CAN-2005-2707).</li>
    </ul>
    <p>
    The Gecko engine in itself is also affected by some of these issues and
    has been updated as well.
    </p>
  </description>
  <impact type="normal">
    <p>
    A remote attacker could setup a malicious site and entice a victim to
    visit it, potentially resulting in arbitrary code execution with the
    victim's privileges or facilitated spoofing of known websites.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround for all the issues.
    </p>
  </workaround>
  <resolution>
    <p>
    All Mozilla Firefox users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.7-r2"</code>
    <p>
    All Mozilla Suite users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.12-r2"</code>
    <p>
    All Mozilla Firefox binary users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.7"</code>
    <p>
    All Mozilla Suite binary users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.12"</code>
    <p>
    All Gecko library users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=net-libs/gecko-sdk-1.7.12"</code>
    <p>
    
    </p>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2701">CAN-2005-2701</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2702">CAN-2005-2702</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2703">CAN-2005-2703</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2704">CAN-2005-2704</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2705">CAN-2005-2705</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2706">CAN-2005-2706</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2707">CAN-2005-2707</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2871">CAN-2005-2871</uri>
    <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Foundation Security Advisories</uri>
  </references>
  <metadata tag="submitter" timestamp="2005-09-15T12:38:09Z">
    koon
  </metadata>
  <metadata tag="bugReady" timestamp="2005-09-18T09:17:15Z">
    koon
  </metadata>
</glsa>