Skip to main content

Mozilla Products Code Execution and Security Bypass Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 15 Jun 2009 4535 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Mozilla Firefox, SeaMonkey and Thunderbird, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service or compromise a vulnerable system.

1. A memory corruption errors in the JavaScript and browser engines when parsing malformed data, which could be exploited by attackers to crash a vulnerable application or execute arbitrary code.

2. Due to certain invalid unicode characters being displayed as whitespace in the location bar when used as part of an IDN, which could be exploited to spoof the location bar.

3. An error when interpreting the "file:" protocol, which could be exploited to access any domain's cookies on a vulnerable system by tricking a user into downloading and opening a malicious file via the browser.

4. An error when handling a non-200 response returned by a proxy in reply to a CONNECT request, which could cause the body of the response to be rendered within the context of the request "Host:" header.

5. Due to a race condition in "NPObjWrapper_NewResolve" when accessing the properties of a NPObject, a wrapped JSObject, which could be exploited to execute arbitrary code by tricking a user into visiting a specially crafted web page.

6. An error when handling event listeners attached to an element whose owner document is null, which could be exploited to execute arbitrary JavaScript with chrome privileges.

7. Due to the "file:" resource inheriting the principal of the previously loaded document when loaded via the location bar, which could allow unauthorized access to local files.

8. Due to content-loading policies not being checked before loading external script files into XUL documents, which could be exploited to bypass restrictions.

9. An unspecified error which could allow scripts from page content to run with elevated privileges, leading to arbitrary code execution.


Impact

  • Denial of Service
  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure

System / Technologies affected

  • Mozilla Firefox versions prior to 3.0.11
  • Mozilla Thunderbird versions prior to 2.0.0.22
  • Mozilla SeaMonkey versions prior to 1.1.17

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link