[UCI-Linux] [SECURITY] Fedora Core 4 Update: mozilla-1.7.12-1.5.1

Mike Iglesias IGLESIAS at uci.edu
Mon Sep 26 10:59:10 PDT 2005

From: "Christopher Aillon" <caillon at redhat.com>
To: fedora-announce-list at redhat.com
Date: Mon, 26 Sep 2005 13:16:21 -0400
Subject: [SECURITY] Fedora Core 4 Update: mozilla-1.7.12-1.5.1

Fedora Update Notification

Product     : Fedora Core 4
Name        : mozilla
Version     : 1.7.12                      
Release     : 1.5.1                  
Summary     : Web browser and mail reader
Description :
Mozilla is an open-source web browser, designed for standards
compliance, performance and portability.

Update Information:

Updated mozilla packages that fix several security bugs are
now available for Fedora Core 4.

This update has been rated as having critical security
impact by the Fedora Security Response Team.

Mozilla is an open source Web browser, advanced email and
newsgroup client, IRC chat client, and HTML editor.

A bug was found in the way Mozilla processes XBM image
files. If a user views a specially crafted XBM file, it
becomes possible to execute arbitrary code as the user
running Mozilla. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2005-2701
to this issue.

A bug was found in the way Mozilla processes certain Unicode
sequences. It may be possible to execute arbitrary code as
the user running Mozilla, if the user views a specially
crafted Unicode sequence. (CAN-2005-2702)

A bug was found in the way Mozilla makes XMLHttp requests.
It is possible that a malicious web page could leverage this
flaw to exploit other proxy or server flaws from the
victim's machine. It is also possible that this flaw could
be leveraged to send XMLHttp requests to hosts other than
the originator; the default behavior of the browser is to
disallow this. (CAN-2005-2703)

A bug was found in the way Mozilla implemented its XBL
interface. It may be possible for a malicious web page to
create an XBL binding in a way that would allow arbitrary
JavaScript execution with chrome permissions. Please note
that in Mozilla 1.7.10 this issue is not directly
exploitable and would need to leverage other unknown
exploits. (CAN-2005-2704)

An integer overflow bug was found in Mozilla's JavaScript
engine. Under favorable conditions, it may be possible for a
malicious web page to execute arbitrary code as the user
running Mozilla. (CAN-2005-2705)

A bug was found in the way Mozilla displays about: pages. It
is possible for a malicious web page to open an about: page,
such as about:mozilla, in such a way that it becomes
possible to execute JavaScript with chrome privileges.

A bug was found in the way Mozilla opens new windows. It is
possible for a malicious web site to construct a new window
without any user interface components, such as the address
bar and the status bar. This window could then be used to
mislead the user for malicious purposes. (CAN-2005-2707)

Users of Mozilla are advised to upgrade to this updated
package that contains Mozilla version 1.7.12 and is not
vulnerable to these issues.

* Thu Sep 22 2005 Christopher Aillon <caillon at redhat.com> 37:1.7.12-1.5.1
- Update to 1.7.12, containing fixes for:
  CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704
  CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 CAN-2005-2968

This update can be downloaded from:

15996667d8d7ff6f716f9a3b3fd73a46  SRPMS/mozilla-1.7.12-1.5.1.src.rpm
6e5d4465c6818212dc200884a6772efc  ppc/mozilla-1.7.12-1.5.1.ppc.rpm
554fab19cd517dac6af547fc9f8a0cab  ppc/mozilla-nspr-1.7.12-1.5.1.ppc.rpm
d96547c7855f990aea45008176c94151  ppc/mozilla-nspr-devel-1.7.12-1.5.1.ppc.rpm
eb943304ee62ad1c21323d48cffac07f  ppc/mozilla-nss-1.7.12-1.5.1.ppc.rpm
388bf012368737e2e9abd8fdae61cd10  ppc/mozilla-nss-devel-1.7.12-1.5.1.ppc.rpm
73a56b8de2ed1ce21ce934d7b4fc0030  ppc/mozilla-devel-1.7.12-1.5.1.ppc.rpm
f0e2bb8447868c5310506cdf4e59f610  ppc/mozilla-mail-1.7.12-1.5.1.ppc.rpm
b6d8b972a810d6be63c9e49acb311a63  ppc/mozilla-chat-1.7.12-1.5.1.ppc.rpm
19bb5d74ed7f347b0bff67b9e2687426  ppc/mozilla-js-debugger-1.7.12-1.5.1.ppc.rpm
87dc66737ae9ff2d01f0900c02a34c92  ppc/mozilla-dom-inspector-1.7.12-1.5.1.ppc.rpm
af43d44627d556682f070afe5b0fcc88  ppc/debug/mozilla-debuginfo-1.7.12-1.5.1.ppc.rpm
7834b3634d54f4ab835c77e247a56b6f  x86_64/mozilla-1.7.12-1.5.1.x86_64.rpm
06bf1c0ffd94de4dd3abe534f6c62448  x86_64/mozilla-nspr-1.7.12-1.5.1.x86_64.rpm
aaea1e31b0d1818d9165928c716f81d7  x86_64/mozilla-nspr-devel-1.7.12-1.5.1.x86_64.rpm
2986c7d17771826b0ce3802b2322cbef  x86_64/mozilla-nss-1.7.12-1.5.1.x86_64.rpm
fd477dad54c6b764730db8255854d8c4  x86_64/mozilla-nss-devel-1.7.12-1.5.1.x86_64.rpm
fba077cce640223cab879d41e5916c99  x86_64/mozilla-devel-1.7.12-1.5.1.x86_64.rpm
5f8e89073c0fb61e9cfe1f36789a3933  x86_64/mozilla-mail-1.7.12-1.5.1.x86_64.rpm
99932f0cd7bc71c5300f7b83021e8bc5  x86_64/mozilla-chat-1.7.12-1.5.1.x86_64.rpm
891fff494775baeef27bd3137684eeec  x86_64/mozilla-js-debugger-1.7.12-1.5.1.x86_64.rpm
ac1e58cffbe7b5cb163c056da0a0f282  x86_64/mozilla-dom-inspector-1.7.12-1.5.1.x86_64.rpm
7e0ea761ff2e9caea8c42b082c13f604  x86_64/debug/mozilla-debuginfo-1.7.12-1.5.1.x86_64.rpm
47c89bff509e46e4b54041aac04f2137  x86_64/mozilla-nspr-1.7.12-1.5.1.i386.rpm
ae517ab122351d6ada9e9289b1c1ef3d  x86_64/mozilla-nss-1.7.12-1.5.1.i386.rpm
9b9ca33577a785f0e36ed2092ed97555  i386/mozilla-1.7.12-1.5.1.i386.rpm
47c89bff509e46e4b54041aac04f2137  i386/mozilla-nspr-1.7.12-1.5.1.i386.rpm
9c409c087a06ccec4ba0b404ca2e1b1d  i386/mozilla-nspr-devel-1.7.12-1.5.1.i386.rpm
ae517ab122351d6ada9e9289b1c1ef3d  i386/mozilla-nss-1.7.12-1.5.1.i386.rpm
d74dd6b014102d3a6f9e0fafae217edf  i386/mozilla-nss-devel-1.7.12-1.5.1.i386.rpm
4b3cacd4a3c274c008d55aae107d108a  i386/mozilla-devel-1.7.12-1.5.1.i386.rpm
b24a2919fafa1f4e314e5a26ef65280f  i386/mozilla-mail-1.7.12-1.5.1.i386.rpm
86ac5ce35a97c750eeb38764553a7653  i386/mozilla-chat-1.7.12-1.5.1.i386.rpm
74b1fd6aea19fd037e5ccec3c94c70c7  i386/mozilla-js-debugger-1.7.12-1.5.1.i386.rpm
30d339600011964baec08ce5d895f42d  i386/mozilla-dom-inspector-1.7.12-1.5.1.i386.rpm
d7c08369f13113f9195097969107549e  i386/debug/mozilla-debuginfo-1.7.12-1.5.1.i386.rpm

This update can also be installed with the Update Agent; you can
launch the Update Agent with the 'up2date' command.  

fedora-announce-list mailing list
fedora-announce-list at redhat.com

More information about the UCI-Linux mailing list