what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 36711

Secunia Security Advisory 36711
Posted Oct 29, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, manipulate certain data, or compromise a user's system.

tags | advisory, vulnerability
SHA-256 | b6b6792baa6dabe58eb7a25f3bbf951a023362b2d4e8b94b203585e3408357a4

Secunia Security Advisory 36711

Change Mirror Download
----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability
intelligence source on the market.

Implement it through Secunia.

For more information visit:
http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com

----------------------------------------------------------------------

TITLE:
Mozilla Firefox Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA36711

VERIFY ADVISORY:
http://secunia.com/advisories/36711/

DESCRIPTION:
Some vulnerabilities have been reported in Mozilla Firefox, which can
be exploited by malicious people to disclose sensitive information,
bypass certain security restrictions, manipulate certain data, or
compromise a user's system.

1) An array indexing error exists when allocating space for floating
point numbers. This can be exploited to trigger a memory corruption
when a specially crafted floating point number is processed.

Successful exploitation allows execution of arbitrary code.

The vulnerability is confirmed in version 3.0.14 and 3.5.3. Prior
versions may also be affected.

2) An error in the form history functionality can be exploited to
disclose history entries via a specially crafted web page that
triggers the automatic filling of form fields.

3) An error when creating JavaScript web-workers recursively can be
exploited to trigger the use of freed memory and cause a crash or
potentially execute arbitrary code.

4) An error exists when parsing regular expressions used in Proxy
Auto-configuration (PAC). This can be exploited to cause a crash or
potentially execute arbitrary code via specially crafted configured
PAC files.

5) An error when processing GIF color maps can be exploited to cause
a heap-based buffer overflow and potentially execute arbitrary code
via a specially crafted GIF file.

6) An error in the "XPCVariant::VariantDataToJS()" XPCOM utility can
be exploited to execute arbitrary JavaScript code with chrome
privileges.

7) An error in the implementation of the JavaScript
"document.getSelection()" function can be exploited to read text
selected on a web page in a different domain.

8) An error when downloading files can be exploited to display
different file names in the download dialog title bar and download
dialog body. This can be exploited to obfuscate file names via a
right-to-left override character and potentially trick a user into
running an executable file.

9) An error in the embedded liboggz library can be exploited to cause
a crash or potentially execute arbitrary code.

10) Multiple errors in the embedded libvorbis library can be
exploited to cause crashes or potentially execute arbitrary code.

11) An error in the embedded liboggplay library can be exploited to
cause a crash or potentially execute arbitrary code.

12) Multiple errors in the Firefox 3 and Firefox 3.5 browser engines
can be exploited to cause crashes or potentially execute arbitrary
code.

13) Multiple errors in the Firefox 3.5 browser engine can be
exploited to cause crashes or potentially execute arbitrary code.

14) An error in the Firefox 3 browser engine can be exploited to
cause a crash or potentially execute arbitrary code.

15) Multiple errors in the Firefox 3.5 JavaScript engine can be
exploited to cause crashes or potentially execute arbitrary code.

SOLUTION:
Update to version 3.0.15 or 3.5.4.

PROVIDED AND/OR DISCOVERED BY:
1) Alin Rad Pop, Secunia Research

The vendor also credits:
2) Paul Stone
3) Orlando Berrera of Sec Theory
4) Marco C.
5) regenrecht, reported via iDefense
6) moz_bug_r_a4
7) Gregory Fleischer
8) Jesse Ruderman and Sid Stamm
9) Georgi Guninski
10) Lucas Adamski, Matthew Gregan, David Keeler, and Dan Kaminsky
11) Juan Becerra
12) Vladimir Vukicevic, Jesse Ruderman, Martijn Wargers, Daniel
Banchero, David Keeler, and Boris Zbarsky
13) Thomas Frederiksen, Marcia Knous, Jesse Ruderman, Carsten Book,
and Kevin Brosnan
14) Carsten Book
15) David Anderson and Jeff Walden

ORIGINAL ADVISORY:
Mozilla Foundation:
http://www.mozilla.org/security/announce/2009/mfsa2009-52.html
http://www.mozilla.org/security/announce/2009/mfsa2009-54.html
http://www.mozilla.org/security/announce/2009/mfsa2009-55.html
http://www.mozilla.org/security/announce/2009/mfsa2009-56.html
http://www.mozilla.org/security/announce/2009/mfsa2009-57.html
http://www.mozilla.org/security/announce/2009/mfsa2009-59.html
http://www.mozilla.org/security/announce/2009/mfsa2009-61.html
http://www.mozilla.org/security/announce/2009/mfsa2009-62.html
http://www.mozilla.org/security/announce/2009/mfsa2009-63.html
http://www.mozilla.org/security/announce/2009/mfsa2009-64.html

Secunia Research:
http://secunia.com/secunia_research/2009-35/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close