Skip to main content

Mozilla Firefox / Thunderbird / Seamonkey Multiple Vulnerabilities

Last Update Date: 30 Aug 2012 12:18 Release Date: 30 Aug 2012 4985 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers

Multiple vulnerabilities were reported in Mozilla Firefox, Thunderbird and Seamonkey. A remote user can cause arbitrary code to be executed, obtain potentially sensitive information and conduct cross-site scripting attacks on the target user's system. A local user can obtain elevated privileges on the target system.

  1. A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target users system. The code will run with the privileges of the target user.
  2. A remote user can shadow the window.location object using Object.defineProperty to potentially conduct cross-site scripting attacks.
  3. If remote debugging is disabled, but the experimental HTTPMonitor extension is enabled, a remote user can connect to and use the remote debugging service via the port used by HTTPMonitor.
  4. A local user can place a specially crafted executable in the root partition on a Windows file system that will be executed by the installer.
  5. A remote user can exploit a flaw in the DOMParser to obtain potentially sensitive information.
  6. A remote user can cause the incorrect SSL certificate information to be displayed on the addressbar.
  7. A remote user can bypass security checks in nsLocation::CheckURL.
  8. A remote user can exploit a flaw in __android_log_print() to potentially execute arbitrary code. Only Firefox for Android is affected.
  9. A remote user can cause arbitrary code to be injected when the target user opens the web console.

Impact

  • Cross-Site Scripting
  • Elevation of Privilege
  • Remote Code Execution
  • Information Disclosure

System / Technologies affected

  • Firefox versions prior to 15.0
  • Thunderbird versions prior to ESR 10.0.7; prior to 15.0
  • Seamonkey versions prior to 2.12

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • The vendor has issued a fix (ESR 10.0.7, 15.0 for Firefox and Thunderbird, and 2.12 for Seamonkey).

Vulnerability Identifier


Source


Related Link