Skip to main content

Mozilla Products Multiple Vulnerabilities

Last Update Date: 1 Nov 2012 Release Date: 29 Oct 2012 5016 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and Seamonkey, which can be exploited by remote user to conduct cross-site scripting attacks or compromise a user's system.

  1. A remote user can exploit the valueOf() method of window.location to, in combination with some plugins, inject scripting code to cause arbitrary scripting code to be executed by the target user's browser. The code will run in the security context of an arbitrary site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
  2. The nsLocation::CheckURL() function in window.location can be made to return the wrong calling document and principal. A remote user can exploit this to cause arbitrary scripting code to be executed by the target user's browser. The code will run in the security context of an arbitrary site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
  3. A remote user may also be able to exploit this flaw in conjunction with a browser add-on to cause arbitrary code to be executed on the target user's system.
  4. A remote user can exploit bypass security wrapper protections on the Location object, allowing the cross-origin reading of the Location object 

Impact

  • Cross-Site Scripting
  • Remote Code Execution

System / Technologies affected

  • Mozilla Firefox
  • Mozilla Thunderbird
  • Mozilla SeaMonkey

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to
    • Firefox 16.0.2
    • Firefox ESR 10.0.10
    • Thunderbird 16.0.2
    • Thunderbird ESR 10.0.10
    • SeaMonkey 2.13.2

Vulnerability Identifier


Source


Related Link