Mozilla Products Multiple Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilitieshave been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.
1. Due to memory corruption errors in the browser engine when parsing malformed data, which could be exploited by attackers to crash a vulnerable browser or execute arbitrary code.
2. Due to a use-after-free error in the DOM attribute cloning routine, which could be exploited by attackers to execute arbitrary code.
3. Due to a use-after-free error in the implementation of NodeIterator when detaching nodes from the DOM tree while it is being traversed, which could be exploited by attackers to execute arbitrary code.
4. Due to a buffer overflow error when storing the names and values of plugin parameter elements, which could be exploited by attackers to execute arbitrary code.
Update: An incorrect fix version (3.6.7) for this Mozilla Firefox plugin parameter array vulnerability was identified¡Arequires to upgrade to Mozilla Firefox version 3.6.8.
5. Due to an error when accessing a content object via SJOW, which could be exploited to execute arbitrary JavaScript with chrome privileges.
6. Due to an integer overflow error when processing CSS values, which could be exploited by attackers to execute arbitrary code.
7. Due to an integer overflow error in the implementation of the XUL "tree" element's selection attribute, which could be exploited by attackers to execute arbitrary code.
8. Due to a buffer overflow error when processing malformed PNG data, which could be exploited by attackers to execute arbitrary code.
9. Due to a same-origin validation error when using the Web Worker method "importScripts", which could be exploited to conduct cross-domain scripting attacks.
10. Due to a same-origin validation error when using canvas elements, which could be exploited to conduct cross-domain scripting attacks.
11. Due to undefined positions within various 8 bit character encodings being mapped to the U+FFFD sequence, which could be exploited to conduct cross site scripting attacks.
12. Due to errors when handling windows and redirections, which could allow attackers to spoof the content of the location bar.
13. Due to an error when handling CSS selectors, which could be exploited to read data across domains.
14. Due to an error when handling error messages, which could cause potentially sensitive URL parameters to be leaked across domains.
Impact
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
System / Technologies affected
- Mozilla Firefox versions prior to 3.6.8
- Mozilla Firefox versions prior to 3.5.11
- Mozilla Thunderbird versions prior to 3.1.1
- Mozilla Thunderbird versions prior to 3.0.6
- Mozilla SeaMonkey versions prior to 2.0.6
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to Mozilla Firefox version 3.6.8 or 3.5.11 :
- http://www.mozilla.com/firefox/ - Upgrade to Mozilla Thunderbird version 3.1.1 or 3.0.6 :
- http://www.mozilla.com/thunderbird/ - Upgrade to Mozilla SeaMonkey version 2.0.6 :
- http://www.mozilla.com/seamonkey/
Vulnerability Identifier
- CVE-2010-0654
- CVE-2010-1205
- CVE-2010-1206
- CVE-2010-1207
- CVE-2010-1208
- CVE-2010-1209
- CVE-2010-1210
- CVE-2010-1211
- CVE-2010-1212
- CVE-2010-1213
- CVE-2010-1214
- CVE-2010-1215
- CVE-2010-2751
- CVE-2010-2752
- CVE-2010-2753
- CVE-2010-2754
Source
Related Link
- http://www.vupen.com/english/advisories/2010/1859
- http://secunia.com/advisories/40642/
- http://secunia.com/advisories/40688/
- http://www.mozilla.org/security/announce/2010/mfsa2010-34.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-35.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-36.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-37.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-38.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-39.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-40.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-41.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-42.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-43.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-44.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-45.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-46.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-47.html
- http://www.mozilla.org/security/announce/2010/mfsa2010-48.html
Share with