Want to join the Secunia Security Team?
Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports.
TITLE: Firefox Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA20376
VERIFY ADVISORY: http://secunia.com/advisories/20376/
CRITICAL: Highly critical
IMPACT: Security Bypass, Cross Site Scripting, System access
WHERE: >From remote
SOFTWARE: Mozilla Firefox 1.x http://secunia.com/product/4227/ Mozilla Firefox 0.x http://secunia.com/product/3256/
DESCRIPTION: Multiple vulnerabilities have been reported in Firefox, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP response smuggling attacks, and potentially compromise a user's system.
2) Some errors in the browser engine can be exploited to cause a memory corruption.
Successful exploitation may allow execution of arbitrary code.
3) Two errors in the handling of specially crafted HTTP responses in certain situations can be exploited to cause the browser to process a response as two separate responses from different sites.
Successful exploitation allows execution of arbitrary HTML and script in a user's browser session in context of an arbitrary site, but requires that the browser is configured to use a proxy or that the malicious site shares the same IP address as the targeted site.
4) Two errors in the handling of the "View Image" and "Show only this frame" functionalities can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an arbitrary site by e.g. tricking a user into right-clicking and choosing "View Image" on a broken image.
7) An error caused due to an off-by-two array boundary error in the "crypto.signText()" function can be exploited to cause a buffer overflow by passing optional Certificate Authority name arguments.
SOLUTION: Update to version 188.8.131.52. http://www.mozilla.com/firefox/
PROVIDED AND/OR DISCOVERED BY: 1) moz_bug_r_a4 2) Mozilla Developers 3) Kazuho Oku, Cybozu Labs 4) Paul Nickerson 5) Jonas Sicking, Mozilla 6) Paul Nickerson and moz_bug_r_a4 7) Mikolaj J. Habryn 8) Masatoshi Kimura 9) moz_bug_r_a4
ORIGINAL ADVISORY: 1) http://www.mozilla.org/security/announce/2006/mfsa2006-31.html 2) http://www.mozilla.org/security/announce/2006/mfsa2006-32.html 3) http://www.mozilla.org/security/announce/2006/mfsa2006-33.html 4) http://www.mozilla.org/security/announce/2006/mfsa2006-34.html 5) http://www.mozilla.org/security/announce/2006/mfsa2006-35.html 6) http://www.mozilla.org/security/announce/2006/mfsa2006-37.html 7) http://www.mozilla.org/security/announce/2006/mfsa2006-38.html 8) http://www.mozilla.org/security/announce/2006/mfsa2006-42.html 9) http://www.mozilla.org/security/announce/2006/mfsa2006-43.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.