---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: Mozilla Firefox 3 URI Launching and XUL Error Page Vulnerabilities SECUNIA ADVISORY ID: SA31106 VERIFY ADVISORY: http://secunia.com/advisories/31106/ CRITICAL: Highly critical IMPACT: Security Bypass, Spoofing, System access WHERE: >From remote SOFTWARE: Mozilla Firefox 3.x http://secunia.com/product/19089/ DESCRIPTION: Some vulnerabilities have been reported in Firefox 3, which can be exploited by malicious people to bypass certain security restrictions, potentially conduct spoofing attacks, or compromise a user's system. 1) A vulnerability can be exploited to launch e.g. "file" or "chrome:" URIs in Firefox. For more information see: SA31120 2) Input passed to XUL based error pages is not properly sanitised before being returned to a user and can be exploited to e.g. conduct spoofing attacks. In combination with vulnerability #1 this can be exploited to inject arbitrary script code and execute arbitrary code in "chrome" context, but requires that a specially crafted URI is passed to Firefox and that Firefox is not running. The vulnerabilities are reported in versions prior to 3.0.1. SOLUTION: Update to version 3.0.1. http://www.mozilla.com/en-US/firefox/ PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Billy Rios 2) Ben Turner and Dan Veditz (Mozilla developers) ORIGINAL ADVISORY: MFSA 2008-35: http://www.mozilla.org/security/announce/2008/mfsa2008-35.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------