U.S. Flag Official website of the Department of Homeland Security

Note: This page is part of the us-cert.gov archive.This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact info@us-cert.gov if you have any questions about the US-CERT website archive.

TLP:WHITE

Alert (TA06-208A)

Mozilla Products Contain Multiple Vulnerabilities

Original release date: July 27, 2006 | Last revised: July 31, 2006

Systems Affected

  • Mozilla SeaMonkey
  • Mozilla Firefox
  • Mozilla Thunderbird
  • Netscape Browser
Any products based on Mozilla components, specifically Gecko, may also be affected.

Overview

The Mozilla web browser and derived products contain several vulnerabilities, the most serious of which could allow a remote attacker to execute arbitrary code on an affected system.

Description

Several vulnerabilities have been reported in the Mozilla web browser and derived products. More detailed information is available in the individual vulnerability notes, including the following:

VU#476724 - Mozilla products fail to properly handle frame references

Mozilla products fail to properly handle frame or window references. This may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3801)

VU#670060 - Mozilla fails to properly release JavaScript references

Mozilla products fail to properly release memory. This vulnerability may allow a remote attacker to execute code on a vulnerable system.
(CVE-2006-3677)

VU#239124 - Mozilla fails to properly handle simultaneous XPCOM events

Mozilla products are vulnerable to memory corruption via simultaneous XPCOM events. This may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3113)

VU#265964 - Mozilla products contain a race condition

Mozilla products contain a race condition. This vulnerability may allow a remote attacker to execute code on a vulnerable system.
(CVE-2006-3803)

VU#897540 - Mozilla products VCard attachment buffer overflow

Mozilla products fail to properly handle malformed VCard attachments, allowing a buffer overflow to occur. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3804)

VU#876420 - Mozilla fails to properly handle garbage collection

The Mozilla JavaScript engine fails to properly perform garbage collection, which may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3805)

VU#655892 - Mozilla JavaScript engine contains multiple integer overflows

The Mozilla JavaScript engine contains multiple integer overflows. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3806)

VU#687396 - Mozilla products fail to properly validate JavaScript constructors

Mozilla products fail to properly validate references returned by JavaScript constructors. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3807)

VU#527676 - Mozilla contains multiple memory corruption vulnerabilities

Mozilla products contain multiple vulnerabilities that can cause memory corruption. This may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3811)

Impact

A remote, unauthenticated attacker could execute arbitrary code on a vulnerable system. An attacker may also be able to cause the vulnerable application to crash.

Solution

Upgrade

Upgrade to Mozilla Firefox 1.5.0.5, Mozilla Thunderbird 1.5.0.5, or SeaMonkey 1.0.3.

Netscape 8.1 is based on Firefox 1.0.7. Until a fixed version is available, please use the following workarounds:

Disable JavaScript and Java

These vulnerabilities can be mitigated by disabling JavaScript and Java in all affected products. For more information about configuring Firefox, please see the "Securing Your Web Browser" document. Netscape users should see the "Site Controls" document for details.


Appendix A. References


Revision History

  • July 27, 2006: Initial release
    July 31, 2006: Added Netscape information

This product is provided subject to this Notification and this Privacy & Use policy.

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top