-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2009.1078
               Firefox updates fix multiple vulnerabilities
                             10 September 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Firefox
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Denial of Service               -- Remote with User Interaction
                      Provide Misleading Information  -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2009-3069 CVE-2009-3070 CVE-2009-3071
                      CVE-2009-3072 CVE-2009-3073 CVE-2009-3074
                      CVE-2009-3075 CVE-2009-3076 CVE-2009-3077
                      CVE-2009-3078 CVE-2009-3079 
Member content until: Saturday, October 10 2009

OVERVIEW

        Mozilla has released 5 advisories relating to Firefox describing a
        total of 11 vulnerabilities. Mozilla has rated 3 of these 
        advisories as "Critical", 1 as "Moderate" and 1 as "Low" impact.


IMPACT

        According to Mozilla, the vulnerabilties corrected in this
        update are:
        
        o MFSA 2009-47 (CVE-2009-3069,CVE-2009-3070,CVE-2009-3071,
          CVE-2009-3072,CVE-2009-3073,CVE-2009-3074,CVE-2009-3075): "Mozilla
          developers and community members identified and fixed several
          stability bugs in the browser engine used in Firefox and other
          Mozilla-based products. Some of these crashes showed evidence of
          memory corruption under certain circumstances and we presume that with
          enough effort at least some of these could be exploited to run
          arbitrary code." [1]
        
        o MSFA 2009-48 (CVE-2009-3076): "...when security modules were added or
          removed via pkcs11.addmodule or pkcs11.deletemodule, the resulting
          dialog was not sufficiently informative. Without sufficient warning,
          an attacker could entice a victim to install a malicious PKCS11
          module and affect the cryptographic integrity of the victim's
          browser." [2]
        
        o MSFA 2009-49 (CVE-2009-3077): "...the columns of a XUL tree element
          could be manipulated in a particular way which would leave a pointer
          owned by the column pointing to freed memory. An attacker could
          potentially use this vulnerability to crash a victim's browser and
          run arbitrary code on the victim's computer." [3]
        
        o MSFA 2009-50 (CVE-2009-3078): "...the default Windows font used to
          render the locationbar and other text fields was improperly
          displaying certain Unicode characters with tall line-height. In such
          cases the tall line-height would cause the rest of the text in the 
          input field to be scrolled vertically out of view. An attacker could
          use this vulnerability to prevent a user from seeing the URL of a
          malicious site." [4]
        
        o MSFA 2009-51 (CVE-2009-3079): "...the BrowserFeedWriter could be
          leveraged to run JavaScript code from web content with elevated
          privileges. Using this vulnerability, an attacker could construct
          an object containing malicious JavaScript and cause the FeedWriter
          to process the object, running the malicious code with chrome
          privileges." [5]


MITIGATION

        These vulnerabilities have been fixed in  Firefox 3.5.3 and 
        Firefox 3.0.14. Updated versions of these programs are available from
        the Mozilla web site. [6]


REFERENCES

        [1] Mozilla Foundation Security Advisory 2009-47
            http://www.mozilla.org/security/announce/2009/mfsa2009-47.html

        [2] Mozilla Foundation Security Advisory 2009-48
            http://www.mozilla.org/security/announce/2009/mfsa2009-48.html

        [3] Mozilla Foundation Security Advisory 2009-49
            http://www.mozilla.org/security/announce/2009/mfsa2009-49.html

        [4] Mozilla Foundation Security Advisory 2009-50
            http://www.mozilla.org/security/announce/2009/mfsa2009-50.html

        [5] Mozilla Foundation Security Advisory 2009-51
            http://www.mozilla.org/security/announce/2009/mfsa2009-51.html

        [6] Mozilla Firefox web browser
            http://www.mozilla.org/firefox

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFKqFpINVH5XJJInbgRAiehAJ0aM+aaKhh9OQb7cKjlIgyiYiwvcACeJCoV
b5PVsbYPbOUL6JED5gfa1m8=
=2xUS
-----END PGP SIGNATURE-----