---------------------------------------------------------------------- Want a new IT Security job? Vacant positions at Secunia: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Mozilla Firefox Three Vulnerabilities SECUNIA ADVISORY ID: SA14654 VERIFY ADVISORY: http://secunia.com/advisories/14654/ CRITICAL: Highly critical IMPACT: Security Bypass, System access WHERE: >From remote SOFTWARE: Mozilla Firefox 1.x http://secunia.com/product/4227/ Mozilla Firefox 0.x http://secunia.com/product/3256/ DESCRIPTION: Three vulnerabilities have been reported in Firefox, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. 1) An error in the restriction of privileged XUL files can e.g. be exploited to open a local privileged XUL file by tricking a user into dragging a faked scrollbar. The vulnerability itself does not pose any direct security risk as no XUL files in the product use external parameters in an insecure way nor do any destructive actions when being opened. 2) A web site added as a sidebar panel can load privileged content, which can be exploited to execute arbitrary programs by injecting JavaScript into a privileged URL. 3) A boundary error in the GIF image processing of Netscape extension 2 blocks can be exploited to cause a heap-based buffer overflow via a specially crafted image. Successful exploitation may allow execution of arbitrary code. The vulnerabilities have been reported in versions prior to 1.0.2. SOLUTION: Update to version 1.0.2. http://www.mozilla.org/products/firefox/ PROVIDED AND/OR DISCOVERED BY: 1) Michael Krax 2) Kohei Yoshino 3) Mark Dowd, ISS X-Force ORIGINAL ADVISORY: 1) Mozilla: http://www.mozilla.org/security/announce/mfsa2005-32.html 2) Mozilla: http://www.mozilla.org/security/announce/mfsa2005-31.html 3) Mozilla: http://www.mozilla.org/security/announce/mfsa2005-30.html ISS: http://xforce.iss.net/xforce/alerts/id/191 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------