---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Mozilla Products Addon Chrome-Loaded "about:blank" Cross-Context Scripting SECUNIA ADVISORY ID: SA26288 VERIFY ADVISORY: http://secunia.com/advisories/26288/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting, System access WHERE: >From remote REVISION: 1.1 originally posted 2007-07-31 SOFTWARE: Mozilla Firefox 2.0.x http://secunia.com/product/12434/ Mozilla SeaMonkey 1.1.x http://secunia.com/product/14383/ Mozilla Thunderbird 2.x http://secunia.com/product/14070/ DESCRIPTION: A vulnerability has been reported in Mozilla products, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error within the handling of "about:blank" pages loaded by chrome in an addon. This can be exploited to execute script code under chrome privileges by e.g. clicking on a link opened in an "about:blank" window created and populated in a certain ways by an addon. Successful exploitation requires that certain addons are installed. The vulnerability is reported in the following products and versions: * Firefox 2.0.0.5 * Thunderbird 2.0.0.5 * SeaMonkey 1.1.3 SOLUTION: Update to the latest versions: Firefox: Update to version 2.0.0.6. http://www.mozilla.com/en-US/firefox/ Thunderbird: Fixed in the upcoming version 2.0.0.6. http://www.mozilla.com/en-US/thunderbird/ SeaMonkey: Fixed in the upcoming version 1.1.4. http://www.mozilla.org/projects/seamonkey/ NOTE: With version 2.0.0.6, changes that prevent exploitation of a URI handling vulnerability in Microsoft Windows were applied to Firefox and Thunderbird. For more information: SA26201 PROVIDED AND/OR DISCOVERED BY: moz_bug_r_a4 CHANGELOG: 2007-07-31: Updated "Description". Added link to vendor advisory. ORIGINAL ADVISORY: http://www.mozilla.org/security/announce/2007/mfsa2007-26.html http://www.mozilla.org/security/announce/2007/mfsa2007-27.html https://bugzilla.mozilla.org/show_bug.cgi?id=388121 OTHER REFERENCES: SA26201: http://secunia.com/advisories/26201/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------