Mozilla Products Memory Corruption and Security Bypass Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Mozilla Firefox and Thunderbird, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service or compromise a vulnerable system.
1. Memory corruption errors in the JavaScript and browser engines when parsing malformed data, which could be exploited by attackers to crash a vulnerable application or execute arbitrary code.
2. A memory corruption error when decoding certain data in Base64, which could be exploited to crash an affected application or execute arbitrary code.
3. A memory corruption error when processing multiple RDFs in XUL tree, which could be exploited to crash an affected application or execute arbitrary code.
4. A memory corruption error within a double frame construction, which could be exploited to crash an affected application or execute arbitrary code.
5. A memory corruption error when unloading the the Flash plugin, which could be exploited to crash an affected application or execute arbitrary code.
6. Heap and integer overflow errors in multiple font glyph rendering libraries, which could be exploited to crash an affected application or execute arbitrary code.
7. A memory corruption error when handling a SVG element on which a watch function and __defineSetter__ function have been set for a particular property, which could be exploited to crash an affected application or execute arbitrary code.
8. Due to "setTimeout", when called with certain object parameters which should be protected with a XPCNativeWrapper, failing to keep the object wrapped when compiling the new function to be executed, which could allow attackers to run arbitrary JavaScript with chrome privileges.
9 . Certain objects that normally receive a XPCCrossOriginWrapper are constructed without the wrapper, which could allow cross-domain scripting attacks.
Impact
- Denial of Service
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
System / Technologies affected
- Mozilla Firefox versions 3.x
- Mozilla Thunderbird versions 2.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to Mozilla Firefox version 3.5.1 or 3.0.12 :
http://www.mozilla.com/firefox/
Vulnerability Identifier
- CVE-2009-1194
- CVE-2009-2462
- CVE-2009-2463
- CVE-2009-2464
- CVE-2009-2465
- CVE-2009-2466
- CVE-2009-2467
- CVE-2009-2468
- CVE-2009-2469
- CVE-2009-2471
- CVE-2009-2472
Source
Related Link
- http://www.vupen.com/english/advisories/2009/1972
- http://www.mozilla.org/security/announce/2009/mfsa2009-34.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-35.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-36.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-37.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-39.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-40.html
Share with