Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2009.1078 Firefox updates fix multiple vulnerabilities 10 September 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Firefox Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2009-3069 CVE-2009-3070 CVE-2009-3071 CVE-2009-3072 CVE-2009-3073 CVE-2009-3074 CVE-2009-3075 CVE-2009-3076 CVE-2009-3077 CVE-2009-3078 CVE-2009-3079 Member content until: Saturday, October 10 2009 OVERVIEW Mozilla has released 5 advisories relating to Firefox describing a total of 11 vulnerabilities. Mozilla has rated 3 of these advisories as "Critical", 1 as "Moderate" and 1 as "Low" impact. IMPACT According to Mozilla, the vulnerabilties corrected in this update are: o MFSA 2009-47 (CVE-2009-3069,CVE-2009-3070,CVE-2009-3071, CVE-2009-3072,CVE-2009-3073,CVE-2009-3074,CVE-2009-3075): "Mozilla developers and community members identified and fixed several stability bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these crashes showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code." [1] o MSFA 2009-48 (CVE-2009-3076): "...when security modules were added or removed via pkcs11.addmodule or pkcs11.deletemodule, the resulting dialog was not sufficiently informative. Without sufficient warning, an attacker could entice a victim to install a malicious PKCS11 module and affect the cryptographic integrity of the victim's browser." [2] o MSFA 2009-49 (CVE-2009-3077): "...the columns of a XUL tree element could be manipulated in a particular way which would leave a pointer owned by the column pointing to freed memory. An attacker could potentially use this vulnerability to crash a victim's browser and run arbitrary code on the victim's computer." [3] o MSFA 2009-50 (CVE-2009-3078): "...the default Windows font used to render the locationbar and other text fields was improperly displaying certain Unicode characters with tall line-height. In such cases the tall line-height would cause the rest of the text in the input field to be scrolled vertically out of view. An attacker could use this vulnerability to prevent a user from seeing the URL of a malicious site." [4] o MSFA 2009-51 (CVE-2009-3079): "...the BrowserFeedWriter could be leveraged to run JavaScript code from web content with elevated privileges. Using this vulnerability, an attacker could construct an object containing malicious JavaScript and cause the FeedWriter to process the object, running the malicious code with chrome privileges." [5] MITIGATION These vulnerabilities have been fixed in Firefox 3.5.3 and Firefox 3.0.14. Updated versions of these programs are available from the Mozilla web site. [6] REFERENCES [1] Mozilla Foundation Security Advisory 2009-47 http://www.mozilla.org/security/announce/2009/mfsa2009-47.html [2] Mozilla Foundation Security Advisory 2009-48 http://www.mozilla.org/security/announce/2009/mfsa2009-48.html [3] Mozilla Foundation Security Advisory 2009-49 http://www.mozilla.org/security/announce/2009/mfsa2009-49.html [4] Mozilla Foundation Security Advisory 2009-50 http://www.mozilla.org/security/announce/2009/mfsa2009-50.html [5] Mozilla Foundation Security Advisory 2009-51 http://www.mozilla.org/security/announce/2009/mfsa2009-51.html [6] Mozilla Firefox web browser http://www.mozilla.org/firefox AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFKqFpINVH5XJJInbgRAiehAJ0aM+aaKhh9OQb7cKjlIgyiYiwvcACeJCoV b5PVsbYPbOUL6JED5gfa1m8= =2xUS -----END PGP SIGNATURE-----