---------------------------------------------------------------------- Want a new IT Security job? Vacant positions at Secunia: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Mozilla Security Bypass and Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA14684 VERIFY ADVISORY: http://secunia.com/advisories/14684/ CRITICAL: Highly critical IMPACT: Security Bypass, System access WHERE: >From remote SOFTWARE: Mozilla 0.x http://secunia.com/product/772/ Mozilla 1.0 http://secunia.com/product/97/ Mozilla 1.1 http://secunia.com/product/98/ Mozilla 1.2 http://secunia.com/product/3100/ Mozilla 1.3 http://secunia.com/product/1480/ Mozilla 1.4 http://secunia.com/product/1481/ Mozilla 1.5 http://secunia.com/product/2478/ Mozilla 1.6 http://secunia.com/product/3101/ Mozilla 1.7.x http://secunia.com/product/3691/ DESCRIPTION: Two vulnerabilities have been reported in Mozilla, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. 1) An error in the restriction of privileged XUL files can e.g. be exploited to open a local privileged XUL file by tricking a user into dragging a faked scrollbar. The vulnerability itself does not pose any direct security risk as no XUL files in the product use external parameters in an insecure way nor do any destructive actions when being opened. 2) A boundary error in the GIF image processing of Netscape extension 2 blocks can be exploited to cause a heap-based buffer overflow via a specially crafted image. Successful exploitation may allow execution of arbitrary code. The vulnerabilities have been reported in versions prior to 1.7.6. SOLUTION: Update to version 1.7.6. http://www.mozilla.org/products/mozilla1.x/ PROVIDED AND/OR DISCOVERED BY: 1) Michael Krax 2) Mark Dowd, ISS X-Force ORIGINAL ADVISORY: 1) Mozilla: http://www.mozilla.org/security/announce/mfsa2005-32.html 2) Mozilla: http://www.mozilla.org/security/announce/mfsa2005-30.html ISS: http://xforce.iss.net/xforce/alerts/id/191 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------