Gentoo Logo

Mozilla Suite: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200703-05 / mozilla
Release Date March 03, 2007
Latest Revision March 03, 2007: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
www-client/mozilla <= 1.7.13 All supported architectures
www-client/mozilla-bin <= 1.7.13 All supported architectures

Related bugreports: #135257


Several vulnerabilities exist in the Mozilla Suite, which is no longer supported by the Mozilla project.

2.  Impact Information


The Mozilla Suite is a popular all-in-one web browser that includes a mail and news reader.


Several vulnerabilities ranging from code execution with elevated privileges to information leaks affect the Mozilla Suite.


A remote attacker could entice a user to browse to a specially crafted website or open a specially crafted mail that could trigger some of the vulnerabilities, potentially allowing execution of arbitrary code, denials of service, information leaks, or cross-site scripting attacks leading to the robbery of cookies of authentication credentials.

3.  Resolution Information


Most of the issues, but not all of them, can be prevented by disabling the HTML rendering in the mail client and JavaScript on every application.


The Mozilla Suite is no longer supported and has been masked after some necessary changes on all the other ebuilds which used to depend on it. Mozilla Suite users should unmerge www-client/mozilla or www-client/mozilla-bin, and switch to a supported product, like SeaMonkey, Thunderbird or Firefox.

Code Listing 3.1: Resolution

# emerge --unmerge "www-client/mozilla"

# emerge --unmerge "www-client/mozilla-bin"

4.  References


Page updated March 03, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.