---------------------------------------------------------------------- Did you know? Our assessment and impact rating along with detailed information such as exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: Mozilla Firefox Multiple Vulnerabilities SECUNIA ADVISORY ID: SA34145 VERIFY ADVISORY: http://secunia.com/advisories/34145/ DESCRIPTION: Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, disclose sensitive information, or compromise a user's system. 1) Multiple errors in the layout and JavaScript engines can be exploited to corrupt memory and potentially execute arbitrary code. 2) An error in the garbage collection process when handling a set of cloned XUL DOM elements linked as a parent and child can be exploited to access freed memory and execute arbitrary code. 3) An error can be exploited via the "nsIRDFService" interface and a cross-domain redirect to bypass the same-origin policy and read XML data from another domain. 4) An error in libpng when handling out-of-memory conditions can be exploited to potentially execute arbitrary code. For more information: SA33970 5) An error when handling invisible control characters included in the location bar can be exploited to spoof a trusted URL. The vulnerabilities are reported in versions prior to 3.0.7. SOLUTION: Update to version 3.0.7. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Martijn Wargers, Jesse Ruderman, Josh Soref, Gary Kwong, and Timothee Groleau 2) an anonymous researcher, reported via ZDI 3) Georgi Guninski 5) Masahiro Yamada ORIGINAL ADVISORY: http://www.mozilla.org/security/announce/2009/mfsa2009-07.html http://www.mozilla.org/security/announce/2009/mfsa2009-08.html http://www.mozilla.org/security/announce/2009/mfsa2009-09.html http://www.mozilla.org/security/announce/2009/mfsa2009-10.html http://www.mozilla.org/security/announce/2009/mfsa2009-11.html OTHER REFERENCES: SA33970: http://secunia.com/advisories/33970/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------