Gentoo Logo

Mozilla Suite: Multiple vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200703-05 / mozilla
Release Date March 03, 2007
Latest Revision March 03, 2007: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
www-client/mozilla <= 1.7.13 All supported architectures
www-client/mozilla-bin <= 1.7.13 All supported architectures

Related bugreports: #135257

Synopsis

Several vulnerabilities exist in the Mozilla Suite, which is no longer supported by the Mozilla project.

2.  Impact Information

Background

The Mozilla Suite is a popular all-in-one web browser that includes a mail and news reader.

Description

Several vulnerabilities ranging from code execution with elevated privileges to information leaks affect the Mozilla Suite.

Impact

A remote attacker could entice a user to browse to a specially crafted website or open a specially crafted mail that could trigger some of the vulnerabilities, potentially allowing execution of arbitrary code, denials of service, information leaks, or cross-site scripting attacks leading to the robbery of cookies of authentication credentials.

3.  Resolution Information

Workaround

Most of the issues, but not all of them, can be prevented by disabling the HTML rendering in the mail client and JavaScript on every application.

Resolution

The Mozilla Suite is no longer supported and has been masked after some necessary changes on all the other ebuilds which used to depend on it. Mozilla Suite users should unmerge www-client/mozilla or www-client/mozilla-bin, and switch to a supported product, like SeaMonkey, Thunderbird or Firefox.

Code Listing 3.1: Resolution

# emerge --unmerge "www-client/mozilla"

# emerge --unmerge "www-client/mozilla-bin"

4.  References



Print

Page updated March 03, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.