Mozilla Firefox, SeaMonkey: Multiple vulnerabilities — GLSA 200712-21

Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Seamonkey.

Affected packages

www-client/mozilla-firefox on all architectures
Affected versions < 2.0.0.11
Unaffected versions >= 2.0.0.11
www-client/mozilla-firefox-bin on all architectures
Affected versions < 2.0.0.11
Unaffected versions >= 2.0.0.11
www-client/seamonkey on all architectures
Affected versions < 1.1.7
Unaffected versions >= 1.1.7
www-client/seamonkey-bin on all architectures
Affected versions < 1.1.7
Unaffected versions >= 1.1.7

Background

Mozilla Firefox is a cross-platform web browser from Mozilla. SeaMonkey is a free, cross-platform Internet suite.

Description

Jesse Ruderman and Petko D. Petkov reported that the jar protocol handler in Mozilla Firefox and Seamonkey does not properly check MIME types (CVE-2007-5947). Gregory Fleischer reported that the window.location property can be used to generate a fake HTTP Referer (CVE-2007-5960). Multiple memory errors have also been reported (CVE-2007-5959).

Impact

A remote attacker could possibly exploit these vulnerabilities to execute arbitrary code in the context of the browser and conduct Cross-Site-Scripting or Cross-Site Request Forgery attacks.

Workaround

There is no known workaround at this time.

Resolution

All Mozilla Firefox users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.11"

All Mozilla Firefox binary users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.11"

All SeaMonkey users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.7"

All SeaMonkey binary users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.7"

References

Release date
December 29, 2007

Latest revision
December 29, 2007: 01

Severity
normal

Exploitable
remote

Bugzilla entries