Gentoo Logo

Mozilla Suite: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200604-18 / mozilla
Release Date April 28, 2006
Latest Revision April 28, 2006: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
www-client/mozilla < 1.7.13 >= 1.7.13 All supported architectures
www-client/mozilla-bin < 1.7.13 >= 1.7.13 All supported architectures

Related bugreports: #130887


Several vulnerabilities in Mozilla Suite allow attacks ranging from script execution with elevated privileges to information leaks.

2.  Impact Information


The Mozilla Suite is a popular all-in-one web browser that includes a mail and news reader.


Several vulnerabilities were found in Mozilla Suite. Version 1.7.13 was released to fix them.


A remote attacker could craft malicious web pages or emails that would leverage these issues to inject and execute arbitrary script code with elevated privileges, steal local files, cookies or other information from web pages or emails, and spoof content. Some of these vulnerabilities might even be exploited to execute arbitrary code with the rights of the user running the client.

3.  Resolution Information


There are no known workarounds for all the issues at this time.


All Mozilla Suite users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.13"

All Mozilla Suite binary users should upgrade to the latest version:

Code Listing 3.2: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.13"

4.  References


Page updated April 28, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.