Mozilla Firefox / Thunderbird Multiple Vulnerabilities
Last Update Date:
18 Aug 2011 12:01
Release Date:
18 Aug 2011
6503
Views
RISK: High Risk
TYPE: Clients - Browsers
Multiple vulnerabilities have been identified in Mozilla Firefox and Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a vulnerable system.
Firefox 3.6.x/Thunderbird 3.1.x:
- Some unspecified errors can be exploited to corrupt memory.
- An error exists within the "SVGTextElement.getCharNumAtPosition()" function.
- An error within the event management code can be exploited to execute arbitrary JavaScript with chrome privileges.
- A use-after-free error exists within the handling of the appendChild object.
- An error when dropping a tab element in content areas can be exploited to execute arbitrary code with chrome privileges.
- An error within the "ThinkPadSensor::Startup()" function loads libraries in an insecure manner and can be exploited to load arbitrary libraries.
- An error when handling the "RegExp.input()" function can be exploited to read data from other domains.
Firefox 5.x/Thunderbird 5.x:
- Some unspecified errors can be exploited to corrupt memory.
- An error in the handling of JAR file permissions can be exploited to manipulate signed JAR files and execute arbitrary JavaScript code in the context of another site.
NOTE: This vulnerability does not affect Mozilla Thunderbird. - An error within WebGL can be exploited to cause a buffer overflow via an overly long shader string.
- An error within the WebGL's ANGLE library can be exploited to cause a heap-based buffer overflow.
- A use-after-free error exists within the "SVGTextElement.getCharNumAtPosition()" function.
- An error within Content Security Policy can lead to proxy authorization credentials being leaked or hosts being resolved incorrectly.
NOTE: This vulnerability does not affect Mozilla Thunderbird. - An error within Windows D2D hardware acceleration can be exploited to bypass the same-origin policy and read data from a different domain.
Impact
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
System / Technologies affected
- Mozilla Firefox 3.6.x
- Mozilla Thunderbird 3.1.x
- Mozilla Firefox 5.x
- Mozilla Thunderbird 5.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to Firefox version 3.6.20 or Thunderbird version 3.1.12.
http://www.mozilla.org/security/announce/2011/mfsa2011-30.html
http://www.mozilla.org/security/announce/2011/mfsa2011-32.html - Upgrade to Firefox version 6 or Thunderbird version 6.
http://www.mozilla.org/security/announce/2011/mfsa2011-29.html
http://www.mozilla.org/security/announce/2011/mfsa2011-31.html
Vulnerability Identifier
- CVE-2011-0084
- CVE-2011-2378
- CVE-2011-2980
- CVE-2011-2981
- CVE-2011-2982
- CVE-2011-2983
- CVE-2011-2984
- CVE-2011-2985
- CVE-2011-2986
- CVE-2011-2987
- CVE-2011-2988
- CVE-2011-2989
- CVE-2011-2990
- CVE-2011-2991
- CVE-2011-2992
- CVE-2011-2993
Source
Related Link
- http://secunia.com/advisories/45666/
- http://www.mozilla.org/security/announce/2011/mfsa2011-30.html
- http://www.mozilla.org/security/announce/2011/mfsa2011-32.html
- http://secunia.com/advisories/45581/
- http://www.mozilla.org/security/announce/2011/mfsa2011-29.html
- http://www.mozilla.org/security/announce/2011/mfsa2011-29.html
Share with