TheTerrorist_75 Posted June 2, 2006 Report Share Posted June 2, 2006 VERIFY ADVISORY: SECUNIA ADVISORY ID: SA20376CRITICAL: http://secunia.com/about_secunia_advisories/IMPACT: Security Bypass, Cross Site Scripting, System accessWHERE: From remoteSOFTWARE:Mozilla Firefox 1.xMozilla Firefox 0.xDESCRIPTION:Multiple vulnerabilities have been reported in Firefox, which can beexploited by malicious people to bypass certain securityrestrictions, conduct cross-site scripting and HTTP responsesmuggling attacks, and potentially compromise a user's system.1) An error in the sandbox protection of JavaScript run viaEvalInSandbox can be exploited to execute arbitrary JavaScript codewith escalated privileges by calling the "valueOf()" function onexternal objects outside of the sandbox.Successful exploitation requires that the attacker is able to executeJavaScript code inside the EvalInSandbox (e.g. via a Proxy Autoconfigscript or a third-party extension using the vulnerablefunctionality).2) Some errors in the browser engine can be exploited to cause amemory corruption.Successful exploitation may allow execution of arbitrary code.3) Two errors in the handling of specially crafted HTTP responses incertain situations can be exploited to cause the browser to process aresponse as two separate responses from different sites.Successful exploitation allows execution of arbitrary HTML and scriptin a user's browser session in context of an arbitrary site, butrequires that the browser is configured to use a proxy or that themalicious site shares the same IP address as the targeted site.4) Two errors in the handling of the "View Image" and "Show only thisframe" functionalities can be exploited to execute arbitrary HTML andscript code in a user's browser session in context of an arbitrarysite by e.g. tricking a user into right-clicking and choosing "ViewImage" on a broken image.5) An error caused due to persisted XUL attributes in certainsituations being associated with an incorrect URL can be exploited toexecute arbitrary JavaScript code with escalated privileges.6) An error caused due to content-defined setters on an objectprototype being called by privileged code in the user interface canbe exploited to execute arbitrary JavaScript code with escalatedprivileges.7) An error caused due to an off-by-two array boundary error in the"crypto.signText()" function can be exploited to cause a bufferoverflow by passing optional Certificate Authority name arguments.8) An error exists due to Unicode Byte-order-Mark (BOM) data beingstripped from documents served in UTF-8 during the conversion toUnicode. This can be exploited to bypass certain HTML and JavaScriptfiltering mechanisms in web applications using the UTF-8 characterencoding.9) An error in the processing of the addSelectionListener whenhandling notifications in certain situations can be exploited toexecute arbitrary JavaScript code with escalated privileges.SOLUTION: Update to version 1.5.0.4.PROVIDED AND/OR DISCOVERED BY:1) moz_bug_r_a42) Mozilla Developers3) Kazuho Oku, Cybozu Labs4) Paul Nickerson5) Jonas Sicking, Mozilla6) Paul Nickerson and moz_bug_r_a47) Mikolaj J. Habryn8) Masatoshi Kimura9) moz_bug_r_a4ORIGINAL ADVISORY:1) http://www.mozilla.org/security/anno...sa2006-31.html2) http://www.mozilla.org/security/anno...sa2006-32.html3) http://www.mozilla.org/security/anno...sa2006-33.html4) http://www.mozilla.org/security/anno...sa2006-34.html5) http://www.mozilla.org/security/anno...sa2006-35.html6) http://www.mozilla.org/security/anno...sa2006-37.html7) http://www.mozilla.org/security/anno...sa2006-38.html8) http://www.mozilla.org/security/anno...sa2006-42.html9) http://www.mozilla.org/security/anno...sa2006-43.htmlPlease note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others. Quote Link to post Share on other sites
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.