Mozilla Products Code Execution and Security Bypass Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilitieshave been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.
1. Due to memory corruption errors in the browser engine when parsing malformed data, which could be exploited by attackers to crash a vulnerable browser or execute arbitrary code.
2. Due to a use-after-free error within "nsTreeSelection", which could allow attackers to execute arbitrary code.
3. Due to a dangling pointer within "nsTreeContentView" when inserting "option" elements into a XUL tree "optgroup", which could allow attackers to execute arbitrary code.
4. Due to a dangling pointer within "nsPluginArray" when handling "window.navigator.plugins" object, which could allow attackers to execute arbitrary code.
5. Due to an error when handling browser applets, which could be exploited by attackers to turn a simple mouse click into a drag-and-drop action, leading to chrome privilege escalation.
6. Due to an error in the "XMLHttpRequestSpy" module in the Firebug add-on, which could allow chrome privilege escalation and arbitrary code execution.
7. Due to an error in the Network Security Services module.
8. Due to an error when handling an image tag pointing to a resource that redirects to a "mailto:" URL, which could cause the external email handler application to be launched, creating an annoyance when browsing a web site.
9. Due to "XMLDocument::load()" not checking "nsIContentPolicy".
Impact
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
System / Technologies affected
- Mozilla Firefox versions prior to 3.6.2
- Mozilla Firefox versions prior to 3.5.9
- Mozilla Firefox versions prior to 3.0.19
- Mozilla Thunderbird versions prior to 3.0.4
- Mozilla SeaMonkey versions prior to 2.0.4
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to Mozilla Firefox version 3.6.2, 3.5.9 or 3.0.19 :
- http://www.mozilla.com/firefox/ - Upgrade to Mozilla Thunderbird version 3.0.4 :
- http://www.mozilla.com/thunderbird/ - Upgrade to Mozilla SeaMonkey version 2.0.4 :
- http://www.mozilla.com/seamonkey/
Vulnerability Identifier
- CVE-2009-3555
- CVE-2010-0173
- CVE-2010-0174
- CVE-2010-0175
- CVE-2010-0176
- CVE-2010-0177
- CVE-2010-0178
- CVE-2010-0179
- CVE-2010-0181
Source
Related Link
- http://www.vupen.com/english/advisories/2010/0748
- http://secunia.com/advisories/39243/
- http://secunia.com/advisories/39242/
- http://secunia.com/advisories/39240/
- http://secunia.com/advisories/39136/
- http://www.mozilla.org/security/announce/2010/mfsa2010-16.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-17.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-18.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-19.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-20.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-21.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-22.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-23.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-24.html
Share with