ibneko: (Default)
TITLE:
Firefox Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA18700

VERIFY ADVISORY:
http://secunia.com/advisories/18700/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, Cross Site Scripting, Exposure of system
information, Exposure of sensitive information, System access

WHERE:
From remote

SOFTWARE:
Mozilla Firefox 0.x
http://secunia.com/product/3256/
Mozilla Firefox 1.x
http://secunia.com/product/4227/

DESCRIPTION:
Multiple vulnerabilities have been reported in Firefox, which can be
exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting attacks, potentially
disclose sensitive information, and potentially compromise a user's
system.

1) Some errors in the JavaScript engine where certain temporary
variables are not properly protected may be exploited to execute
arbitrary code via a user-defined method triggering garbage
collection.

One of the vulnerabilities affects only version 1.5. The other
affects version 1.5 and prior.

2) An error in the dynamic style handling can be exploited to
reference freed memory by changing the style of an element from
"position:relative" to "position:static".

Successful exploitation may allow execution of arbitrary code.

The vulnerability has been reported in version 1.5.

3) An error in the "QueryInterface" method of the Location and
Navigator objects can be exploited to cause a memory corruption.

Successful exploitation may allow execution of arbitrary code.

The vulnerability has been reported in version 1.5.

4) An input validation error in the processing of the attribute name
when calling "XULDocument.persist()" can be exploited to inject
arbitrary XML and JavaScript code in "localstore.rdf", which will be
executed with the permissions of the browser the next time the
browser starts up again.

5) Some integer overflows in the E4X, SVG, and Canvas functionalities
may be exploited to execute arbitrary code.

The vulnerabilities have been reported in version 1.5.

6) A boundary error in the "nsExpatDriver::ParseBuffer()" function in
the XML parser may be exploited to disclose data on the heap.

The vulnerability does not affect version 1.0.

7) The internal "AnyName" object of the E4X functionality is not
properly protected. This can be exploited to create a communication
channel between two windows or frames having different domains.

This does not pose any direct risks and does not allow bypass of
same-origin restrictions or disclosure of web content from other
domains.

The vulnerability does not affect version 1.0.

SOLUTION:
Update to version 1.5.0.1.
http://www.mozilla.com/firefox/


So yeah, go update.
ibneko: (Default)
So, er, yay. Keys at wwwkeys.pgp.net.

I'm vaguely lost as to what.. I'm really doing. ^^;; ::hasn't exactly sat down and read through how/what he should do with keys and such...::
ibneko: (Default)
I can't run this. No. Not if it's going to block apple.com, and not have some easily configuration method / allow list. Or quick on/off switching.

Yes, being safe is good. No, being INSANELY paranoid is BAD.

Here's PeerSniper, for PeerGuardian OSX removal.
http://www.versiontracker.com/dyn/moreinfo/macosx/25730

[edit]
Hah, I should have done more research.

Apparently that PeerGuardian OSX was a pretty crappy attempt, according to the forums at phoenixlabs... And thus, here's PeerProtector!
http://forums.phoenixlabs.org/showthread.php?s=81de309e984c7c934d196e0e316911f5&t=10229, linked from http://forums.phoenixlabs.org/f65-peerguardian-osx.html

SHA1(PeerProtector_1.0.0.zip)= e42549b7cb7e14a697838fe075534b0506547d52

KLT Mirror: http://www.softvb.com/hosted/PeerProtector_1.0.0.zip
ibneko: (Default)
http://blogs.washingtonpost.com/securityfix/2005/09/firefox_netscap.html

A security researcher has uncovered serious security holes in the latest versions of the Firefox, Mozilla Suite and Netscape Web browsers, flaws that could allow attackers to break into computers if users visit a specially crafted Web site or click on a malformed link in an e-mail, for example.

Bad guys are almost certain to take advantage of this flaw, if for no other reason than it is extremely easy to exploit. All three browsers can be forced to execute a command or computer program of the attacker's choice just by directing them to a URL that is little more than "http://" and a string of dashes....

Expand Cut Tags

No cut tags

Profile

ibneko: (Default)
ibneko

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Page generated Jun. 30th, 2025 07:59 am
Powered by Dreamwidth Studios
January 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 2021