Secunia Security Advisory - Details have been released about several vulnerabilities in Firefox, Mozilla and Thunderbird. These can be exploited by malicious people to bypass certain security restrictions, conduct spoofing and script insertion attacks and disclose sensitive and system information.
a8915f9684acfb40baf7234fa34a3d935c81940168ecd3068d48c40f43175bb1
TITLE:
Firefox / Mozilla / Thunderbird Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA14017
VERIFY ADVISORY:
http://secunia.com/advisories/14017/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, Cross Site Scripting, Spoofing, Exposure of system
information, Exposure of sensitive information
WHERE:
>From remote
SOFTWARE:
Mozilla 0.x
http://secunia.com/product/772/
Mozilla 1.0
http://secunia.com/product/97/
Mozilla 1.1
http://secunia.com/product/98/
Mozilla 1.2
http://secunia.com/product/3100/
Mozilla 1.3
http://secunia.com/product/1480/
Mozilla 1.4
http://secunia.com/product/1481/
Mozilla 1.5
http://secunia.com/product/2478/
Mozilla 1.6
http://secunia.com/product/3101/
Mozilla 1.7.x
http://secunia.com/product/3691/
Mozilla Firefox 0.x
http://secunia.com/product/3256/
Mozilla Thunderbird 0.x
http://secunia.com/product/2637/
DESCRIPTION:
Details have been released about several vulnerabilities in Firefox,
Mozilla and Thunderbird. These can be exploited by malicious people
to bypass certain security restrictions, conduct spoofing and script
insertion attacks and disclose sensitive and system information.
1) An error in the handling of links with a custom getter and
"toString()" function can be exploited to link to local resources by
tricking a user into opening a malicious link in a new tab.
The vulnerability has been reported in versions prior to Firefox 1.0
and Mozilla 1.7.5.
2) An error in the displaying of the SSL lock icon can be exploited
by a malicious web site to force the SSL lock icon to appear by
loading a binary file from a secure server.
The vulnerability has been reported in versions prior to Firefox 1.0
and Mozilla 1.7.5.
3) A malicious web site can spoof the SSL lock icon via a specially
crafted "view-source:" URL.
The vulnerability has been reported in versions prior to Firefox 1.0
and Mozilla 1.7.5.
4) Script generated clicks are treated similar as normal clicks and
can e.g. be exploited to trigger downloads without user prompts.
The vulnerability has been reported in versions prior to Firefox
1.0.
5) An error in the handling of script generated middle-click events
can be exploited to disclose the clipboard content on certain
systems.
The vulnerability has been reported in versions prior to Firefox 1.0
and Mozilla 1.7.5.
6) An error in the handling of "407" proxy authorization requests can
be exploited via arbitrary SSL servers to disclose NTLM or SPNEGO
credentials.
Successful exploitation requires that a proxy has been configured.
The vulnerability has been reported in versions prior to Firefox 1.0
and Mozilla 1.7.5.
7) The problem is that "javascript:" URLs are loaded by the operating
system's default handler (e.g. Microsoft Internet Explorer) from the
mail client.
The problem has been reported in versions prior to Thunderbird 0.9.
8) The mail client incorrectly responds to cookie requests over
HTTP.
The vulnerability has been reported in Thunderbird 0.6 through 0.9
and Mozilla 1.7 through 1.7.3.
9) The problem is that Livefeed bookmarks can contain "javascript:"
and "data:" URLs. This can be exploited to inject arbitrary HTML and
script code, which will be executed in a user's browser session in
context of the currently loaded site when the Livefeed is updated.
The vulnerability has been reported in versions prior to Firefox 1.0.
SOLUTION:
Mozilla:
Update to version 1.7.5.
http://www.mozilla.org/products/mozilla1.x/
Firefox:
Update to version 1.0.
http://www.mozilla.org/products/firefox/
Thunderbird:
Update to version 1.0.
http://www.mozilla.org/products/thunderbird/
PROVIDED AND/OR DISCOVERED BY:
1) Jesse Ruderman
2) Kylotan
3) Kohei Yoshino
4) Omar Khan
5) Jesse Ruderman
6) Christopher Nebergall
7) Tom Braun
8) Michiel van Leeuwen
9) Omar Khan
ORIGINAL ADVISORY:
1) http://www.mozilla.org/security/announce/mfsa2005-01.html
2) http://www.mozilla.org/security/announce/mfsa2005-03.html
3) http://www.mozilla.org/security/announce/mfsa2005-04.html
4) http://www.mozilla.org/security/announce/mfsa2005-07.html
5) http://www.mozilla.org/security/announce/mfsa2005-08.html
6) http://www.mozilla.org/security/announce/mfsa2005-09.html
7) http://www.mozilla.org/security/announce/mfsa2005-10.html
8) http://www.mozilla.org/security/announce/mfsa2005-11.html
9) http://www.mozilla.org/security/announce/mfsa2005-12.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------