Lucene search

K
gentooGentoo FoundationGLSA-200503-31
HistoryMar 25, 2005 - 12:00 a.m.

Mozilla Firefox: Multiple vulnerabilities

2005-03-2500:00:00
Gentoo Foundation
security.gentoo.org
12

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.941 High

EPSS

Percentile

99.1%

Background

Mozilla Firefox is the popular next-generation browser from the Mozilla project.

Description

The following vulnerabilities were found and fixed in Mozilla Firefox:

  • Mark Dowd from ISS X-Force reported an exploitable heap overrun in the GIF processing of obsolete Netscape extension 2 (CAN-2005-0399)
  • Kohei Yoshino discovered that a page bookmarked as a sidebar could bypass privileges control (CAN-2005-0402)
  • Michael Krax reported a new way to bypass XUL security restrictions through drag-and-drop of items like scrollbars (CAN-2005-0401)

Impact

  • The GIF heap overflow could be triggered by a malicious GIF image that would end up executing arbitrary code with the rights of the user running Firefox
  • By tricking the user into bookmarking a malicious page as a Sidebar, a remote attacker could potentially execute arbitrary code with the rights of the user running the browser
  • By setting up a malicious website and convincing users to obey very specific drag-and-drop instructions, attackers may leverage drag-and-drop features to bypass XUL security restrictions, which could be used as a stepping stone to exploit other vulnerabilities

Workaround

There is no known workaround at this time.

Resolution

All Mozilla Firefox users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.2"

All Mozilla Firefox binary users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.2"

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.941 High

EPSS

Percentile

99.1%