Firefox / Mozilla / Thunderbird Multiple Vulnerabilities

vbimport

#1

http://secunia.com/advisories/14017/

Secunia Advisory: SA14017 Print Advisory
Release Date: 2005-01-31

Critical:
Moderately critical
Impact: Security Bypass
Cross Site Scripting
Spoofing
Exposure of system information
Exposure of sensitive information
Where: From remote
Solution Status: Vendor Patch

Software: Mozilla 0.x
Mozilla 1.0
Mozilla 1.1
Mozilla 1.2
Mozilla 1.3
Mozilla 1.4
Mozilla 1.5
Mozilla 1.6
Mozilla 1.7.x
Mozilla Firefox 0.x
Mozilla Thunderbird 0.x

Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.

CVE reference: CAN-2005-0141
CAN-2005-0143
CAN-2005-0144
CAN-2005-0145
CAN-2005-0146
CAN-2005-0147
CAN-2005-0148
CAN-2005-0149
CAN-2005-0150

Description:
Details have been released about several vulnerabilities in Firefox, Mozilla and Thunderbird. These can be exploited by malicious people to bypass certain security restrictions, conduct spoofing and script insertion attacks and disclose sensitive and system information.

  1. An error in the handling of links with a custom getter and “toString()” function can be exploited to link to local resources by tricking a user into opening a malicious link in a new tab.

The vulnerability has been reported in versions prior to Firefox 1.0 and Mozilla 1.7.5.

  1. An error in the displaying of the SSL lock icon can be exploited by a malicious web site to force the SSL lock icon to appear by loading a binary file from a secure server.

The vulnerability has been reported in versions prior to Firefox 1.0 and Mozilla 1.7.5.

  1. A malicious web site can spoof the SSL lock icon via a specially crafted “view-source:” URL.

The vulnerability has been reported in versions prior to Firefox 1.0 and Mozilla 1.7.5.

  1. Script generated clicks are treated similar as normal clicks and can e.g. be exploited to trigger downloads without user prompts.

The vulnerability has been reported in versions prior to Firefox 1.0.

  1. An error in the handling of script generated middle-click events can be exploited to disclose the clipboard content on certain systems.

The vulnerability has been reported in versions prior to Firefox 1.0 and Mozilla 1.7.5.

  1. An error in the handling of “407” proxy authorization requests can be exploited via arbitrary SSL servers to disclose NTLM or SPNEGO credentials.

Successful exploitation requires that a proxy has been configured.

The vulnerability has been reported in versions prior to Firefox 1.0 and Mozilla 1.7.5.

  1. The problem is that “javascript:” URLs are loaded by the operating system’s default handler (e.g. Microsoft Internet Explorer) from the mail client.

The problem has been reported in versions prior to Thunderbird 0.9.

  1. The mail client incorrectly responds to cookie requests over HTTP.

The vulnerability has been reported in Thunderbird 0.6 through 0.9 and Mozilla 1.7 through 1.7.3.

  1. The problem is that Livefeed bookmarks can contain “javascript:” and “data:” URLs. This can be exploited to inject arbitrary HTML and script code, which will be executed in a user’s browser session in context of the currently loaded site when the Livefeed is updated.

The vulnerability has been reported in versions prior to Firefox 1.0.

Solution:
Mozilla:
Update to version 1.7.5.
http://www.mozilla.org/products/mozilla1.x/

Firefox:
Update to version 1.0.

Thunderbird:
Update to version 1.0.

Original Advisory:

  1. http://www.mozilla.org/security/announce/mfsa2005-01.html
  2. http://www.mozilla.org/security/announce/mfsa2005-03.html
  3. http://www.mozilla.org/security/announce/mfsa2005-04.html
  4. http://www.mozilla.org/security/announce/mfsa2005-07.html
  5. http://www.mozilla.org/security/announce/mfsa2005-08.html
  6. http://www.mozilla.org/security/announce/mfsa2005-09.html
  7. http://www.mozilla.org/security/announce/mfsa2005-10.html
  8. http://www.mozilla.org/security/announce/mfsa2005-11.html
  9. http://www.mozilla.org/security/announce/mfsa2005-12.htm