what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 14017

Secunia Security Advisory 14017
Posted Feb 1, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Details have been released about several vulnerabilities in Firefox, Mozilla and Thunderbird. These can be exploited by malicious people to bypass certain security restrictions, conduct spoofing and script insertion attacks and disclose sensitive and system information.

tags | advisory, spoof, vulnerability
SHA-256 | a8915f9684acfb40baf7234fa34a3d935c81940168ecd3068d48c40f43175bb1

Secunia Security Advisory 14017

Change Mirror Download

TITLE:
Firefox / Mozilla / Thunderbird Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA14017

VERIFY ADVISORY:
http://secunia.com/advisories/14017/

CRITICAL:
Moderately critical

IMPACT:
Security Bypass, Cross Site Scripting, Spoofing, Exposure of system
information, Exposure of sensitive information

WHERE:
>From remote

SOFTWARE:
Mozilla 0.x
http://secunia.com/product/772/
Mozilla 1.0
http://secunia.com/product/97/
Mozilla 1.1
http://secunia.com/product/98/
Mozilla 1.2
http://secunia.com/product/3100/
Mozilla 1.3
http://secunia.com/product/1480/
Mozilla 1.4
http://secunia.com/product/1481/
Mozilla 1.5
http://secunia.com/product/2478/
Mozilla 1.6
http://secunia.com/product/3101/
Mozilla 1.7.x
http://secunia.com/product/3691/
Mozilla Firefox 0.x
http://secunia.com/product/3256/
Mozilla Thunderbird 0.x
http://secunia.com/product/2637/

DESCRIPTION:
Details have been released about several vulnerabilities in Firefox,
Mozilla and Thunderbird. These can be exploited by malicious people
to bypass certain security restrictions, conduct spoofing and script
insertion attacks and disclose sensitive and system information.

1) An error in the handling of links with a custom getter and
"toString()" function can be exploited to link to local resources by
tricking a user into opening a malicious link in a new tab.

The vulnerability has been reported in versions prior to Firefox 1.0
and Mozilla 1.7.5.

2) An error in the displaying of the SSL lock icon can be exploited
by a malicious web site to force the SSL lock icon to appear by
loading a binary file from a secure server.

The vulnerability has been reported in versions prior to Firefox 1.0
and Mozilla 1.7.5.

3) A malicious web site can spoof the SSL lock icon via a specially
crafted "view-source:" URL.

The vulnerability has been reported in versions prior to Firefox 1.0
and Mozilla 1.7.5.

4) Script generated clicks are treated similar as normal clicks and
can e.g. be exploited to trigger downloads without user prompts.

The vulnerability has been reported in versions prior to Firefox
1.0.

5) An error in the handling of script generated middle-click events
can be exploited to disclose the clipboard content on certain
systems.

The vulnerability has been reported in versions prior to Firefox 1.0
and Mozilla 1.7.5.

6) An error in the handling of "407" proxy authorization requests can
be exploited via arbitrary SSL servers to disclose NTLM or SPNEGO
credentials.

Successful exploitation requires that a proxy has been configured.

The vulnerability has been reported in versions prior to Firefox 1.0
and Mozilla 1.7.5.

7) The problem is that "javascript:" URLs are loaded by the operating
system's default handler (e.g. Microsoft Internet Explorer) from the
mail client.

The problem has been reported in versions prior to Thunderbird 0.9.

8) The mail client incorrectly responds to cookie requests over
HTTP.

The vulnerability has been reported in Thunderbird 0.6 through 0.9
and Mozilla 1.7 through 1.7.3.

9) The problem is that Livefeed bookmarks can contain "javascript:"
and "data:" URLs. This can be exploited to inject arbitrary HTML and
script code, which will be executed in a user's browser session in
context of the currently loaded site when the Livefeed is updated.

The vulnerability has been reported in versions prior to Firefox 1.0.

SOLUTION:
Mozilla:
Update to version 1.7.5.
http://www.mozilla.org/products/mozilla1.x/

Firefox:
Update to version 1.0.
http://www.mozilla.org/products/firefox/

Thunderbird:
Update to version 1.0.
http://www.mozilla.org/products/thunderbird/

PROVIDED AND/OR DISCOVERED BY:
1) Jesse Ruderman
2) Kylotan
3) Kohei Yoshino
4) Omar Khan
5) Jesse Ruderman
6) Christopher Nebergall
7) Tom Braun
8) Michiel van Leeuwen
9) Omar Khan

ORIGINAL ADVISORY:
1) http://www.mozilla.org/security/announce/mfsa2005-01.html
2) http://www.mozilla.org/security/announce/mfsa2005-03.html
3) http://www.mozilla.org/security/announce/mfsa2005-04.html
4) http://www.mozilla.org/security/announce/mfsa2005-07.html
5) http://www.mozilla.org/security/announce/mfsa2005-08.html
6) http://www.mozilla.org/security/announce/mfsa2005-09.html
7) http://www.mozilla.org/security/announce/mfsa2005-10.html
8) http://www.mozilla.org/security/announce/mfsa2005-11.html
9) http://www.mozilla.org/security/announce/mfsa2005-12.html

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close