Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
[ GLSA 200408-22 ] Mozilla, Firefox, Thunderbird, Galeon, Epiphany: New releases fix vulnerab ilitie
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index News & Announcements
View previous topic :: View next topic  
Author Message
GLSA
Bodhisattva
Bodhisattva


Joined: 13 Jun 2003
Posts: 4087
Location: Dresden, Germany

PostPosted: Tue Aug 24, 2004 12:27 pm    Post subject: [ GLSA 200408-22 ] Mozilla, Firefox, Thunderbird, Galeon, Ep Reply with quote

Gentoo Linux Security Advisory

Title: Mozilla, Firefox, Thunderbird, Galeon, Epiphany: New releases fix vulnerabilities (GLSA 200408-22)
Severity: normal
Exploitable: remote
Date: August 23, 2004
Updated: December 30, 2007
Bug(s): #57380, #59419
ID: 200408-22

Synopsis

New releases of Mozilla, Epiphany, Galeon, Mozilla Thunderbird, and Mozilla Firefox fix several vulnerabilities, including remote DoS and buffer overflows.

Background

Mozilla is a popular web browser that includes a mail and newsreader. Galeon and Epiphany are both web browsers that use gecko, the Mozilla rendering engine. Mozilla Firefox is the next-generation browser from the Mozilla project that incorporates advanced features that are yet to be incorporated into Mozilla. Mozilla Thunderbird is the next-generation mail client from the Mozilla project.

Affected Packages

Package: www-client/mozilla
Vulnerable: < 1.7.2
Unaffected: >= 1.7.2
Architectures: All supported architectures

Package: www-client/mozilla-firefox
Vulnerable: < 0.9.3
Unaffected: >= 0.9.3
Architectures: All supported architectures

Package: mail-client/mozilla-thunderbird
Vulnerable: < 0.7.3
Unaffected: >= 0.7.3
Architectures: All supported architectures

Package: www-client/mozilla-bin
Vulnerable: < 1.7.2
Unaffected: >= 1.7.2
Architectures: All supported architectures

Package: www-client/mozilla-firefox-bin
Vulnerable: < 0.9.3
Unaffected: >= 0.9.3
Architectures: All supported architectures

Package: mail-client/mozilla-thunderbird-bin
Vulnerable: < 0.7.3
Unaffected: >= 0.7.3
Architectures: All supported architectures

Package: www-client/epiphany
Vulnerable: < 1.2.7-r1
Unaffected: >= 1.2.7-r1
Architectures: All supported architectures

Package: www-client/galeon
Vulnerable: < 1.3.17
Unaffected: >= 1.3.17
Architectures: All supported architectures


Description

Mozilla, Galeon, Epiphany, Mozilla Firefox and Mozilla Thunderbird contain the following vulnerabilities:
  • All Mozilla tools use libpng for graphics. This library contains a buffer overflow which may lead to arbitrary code execution.
  • If a user imports a forged Certificate Authority (CA) certificate, it may overwrite and corrupt the valid CA already installed on the machine.
Mozilla, Mozilla Firefox, and other gecko-based browsers also contain a bug in their caching which may allow the SSL icon to remain visible, even when the site in question is an insecure site.

Impact

Users of Mozilla, Mozilla Firefox, and other gecko-based browsers are susceptible to SSL certificate spoofing, a Denial of Service against legitimate SSL sites, crashes, and arbitrary code execution. Users of Mozilla Thunderbird are susceptible to crashes and arbitrary code execution via malicious e-mails.

Workaround

There is no known workaround for most of these vulnerabilities. All users are advised to upgrade to the latest available version.

Resolution

All users should upgrade to the latest stable version:
Code:
# emerge sync
# emerge -pv your-version
# emerge your-version


References

CAN-2004-0763
CAN-2004-0758
CAN-2004-0597
CAN-2004-0598
CAN-2004-0599


Last edited by GLSA on Mon Dec 31, 2007 4:16 am; edited 4 times in total
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index News & Announcements All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum