Mozilla Products Code Execution and Security Bypass Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilitieshave been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.
1. Due to a use-after-free error when handling "multipart/x-mixed-replace" images, which could allow attackers to crash an affected browser or execute arbitrary code.
2. Due to an error when handling "window.location" objects, which could allow cross-origin bypass via third-party plugins.
3. Due to memory corruption errors in the browser engines when parsing malformed data, which could be exploited by attackers to crash a vulnerable browser or execute arbitrary code.
4. Due to an error when using "addEventListener" and "setTimeout" on a wrapped object, which could allow cross site scripting attacks.
5. Due to an error when preloading images, which could allow cross-site request forgery attacks against certain add-ons.
6. Due to an error when handling stylesheets used in remote XUL documents, which could allow a malicious website to pollute a user's XUL cache and change style attributes of the browser (e.g. font size and color).
7. Due to the new asynchronous Authorization Prompt (HTTP username and password) not always being attached to the correct window, which could allow attackers to conduct phishing attacks.
Impact
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
System / Technologies affected
- Mozilla Firefox versions prior to 3.6.2
- Mozilla Firefox versions prior to 3.5.8
- Mozilla Firefox versions prior to 3.0.18
- Mozilla Thunderbird versions prior to 3.0.2
- Mozilla SeaMonkey versions prior to 2.0.3
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to Mozilla Firefox version 3.6.2, 3.5.8 or 3.0.18 :
http://www.mozilla.com/firefox/ - Upgrade to Mozilla Thunderbird version 3.0.2 :
http://www.mozilla.com/thunderbird/ - Upgrade to Mozilla SeaMonkey version 2.0.3 :
http://www.mozilla.com/seamonkey/
Vulnerability Identifier
- CVE-2010-0164
- CVE-2010-0165
- CVE-2010-0166
- CVE-2010-0167
- CVE-2010-0168
- CVE-2010-0169
- CVE-2010-0170
- CVE-2010-0171
- CVE-2010-0172
Source
Related Link
- http://www.vupen.com/english/advisories/2010/0692
- http://www.mozilla.org/security/announce/2010/mfsa2010-09.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-10.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-11.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-12.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-13.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-14.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-15.html
Share with