CVE-2005-1160 |
|
发布时间 :2005-05-02 00:00:00 | ||
修订时间 :2017-10-10 21:30:04 | ||||
NMCOPS |
[原文]The privileged "chrome" UI code in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to gain privileges by overriding certain properties or methods of DOM nodes, as demonstrated using multiple attacks involving the eval function or the Script object.
[CNNVD]Mozilla Browser/Firefox引擎整数溢出漏洞(CNNVD-200505-509)
Mozilla Browser和Firefox都是非常流行的开放源码WEB浏览器。
Mozilla和Firefox的JavaScript引擎中存在整数溢出漏洞,在有利的条件下,恶意的Web页面可能以运行Mozilla或Firefox用户的权限执行任意代码。
- CVSS (基础分值)
CVSS分值: | 5.1 | [中等(MEDIUM)] |
机密性影响: | [--] | |
完整性影响: | [--] | |
可用性影响: | [--] | |
攻击复杂度: | [--] | |
攻击向量: | [--] | |
身份认证: | [--] |
- CPE (受影响的平台与产品)
cpe:/a:mozilla:firefox:0.8 | Mozilla Firefox 0.8 |
cpe:/a:mozilla:firefox:0.9 | Mozilla Firefox 0.9 |
cpe:/a:mozilla:firefox:0.9:rc | Mozilla Firefox 0.9 rc |
cpe:/a:mozilla:firefox:0.9.1 | Mozilla Firefox 0.9.1 |
cpe:/a:mozilla:firefox:0.9.2 | Mozilla Firefox 0.9.2 |
cpe:/a:mozilla:firefox:0.9.3 | Mozilla Firefox 0.9.3 |
cpe:/a:mozilla:firefox:0.10 | Mozilla Firefox 0.10 |
cpe:/a:mozilla:firefox:0.10.1 | Mozilla Firefox 0.10.1 |
cpe:/a:mozilla:firefox:1.0 | Mozilla Firefox 1.0 |
cpe:/a:mozilla:firefox:1.0.1 | Mozilla Firefox 1.0.1 |
cpe:/a:mozilla:firefox:1.0.2 | Mozilla Firefox 1.0.2 |
cpe:/a:mozilla:mozilla:1.3 | Mozilla Mozilla 1.3 |
cpe:/a:mozilla:mozilla:1.4 | Mozilla Mozilla 1.4 |
cpe:/a:mozilla:mozilla:1.4:alpha | Mozilla Mozilla 1.4a |
cpe:/a:mozilla:mozilla:1.4.1 | Mozilla Mozilla 1.4.1 |
cpe:/a:mozilla:mozilla:1.5 | Mozilla Mozilla 1.5 |
cpe:/a:mozilla:mozilla:1.5:alpha | Mozilla Mozilla 1.5 alpha |
cpe:/a:mozilla:mozilla:1.5:rc1 | Mozilla Mozilla 1.5 rc1 |
cpe:/a:mozilla:mozilla:1.5:rc2 | Mozilla Mozilla 1.5 rc2 |
cpe:/a:mozilla:mozilla:1.5.1 | Mozilla Mozilla 1.5.1 |
cpe:/a:mozilla:mozilla:1.6 | Mozilla Mozilla 1.6 |
cpe:/a:mozilla:mozilla:1.6:alpha | Mozilla Mozilla 1.6 alpha |
cpe:/a:mozilla:mozilla:1.6:beta | Mozilla Mozilla 1.6 beta |
cpe:/a:mozilla:mozilla:1.7 | Mozilla Mozilla 1.7 |
cpe:/a:mozilla:mozilla:1.7:alpha | Mozilla Mozilla 1.7 alpha |
cpe:/a:mozilla:mozilla:1.7:beta | Mozilla Mozilla 1.7 beta |
cpe:/a:mozilla:mozilla:1.7:rc1 | Mozilla Mozilla 1.7 rc1 |
cpe:/a:mozilla:mozilla:1.7:rc2 | Mozilla Mozilla 1.7 rc2 |
cpe:/a:mozilla:mozilla:1.7:rc3 | Mozilla Mozilla 1.7 rc3 |
cpe:/a:mozilla:mozilla:1.7.1 | Mozilla Mozilla 1.7.1 |
cpe:/a:mozilla:mozilla:1.7.2 | Mozilla Mozilla 1.7.2 |
cpe:/a:mozilla:mozilla:1.7.3 | Mozilla Mozilla 1.7.3 |
cpe:/a:mozilla:mozilla:1.7.5 | Mozilla Mozilla 1.7.5 |
cpe:/a:mozilla:mozilla:1.7.6 | Mozilla Mozilla 1.7.6 |
- OVAL (用于检测的技术细节)
oval:org.mitre.oval:def:11291 | The privileged "chrome" UI code in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to gain privileges by overrid... |
oval:org.mitre.oval:def:100017 | Mozilla DOM Node Privilege Escalation Vulnerability |
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。 |
- 官方数据库链接
- 其它链接及资源
- 漏洞信息
Mozilla Browser/Firefox引擎整数溢出漏洞 | |
中危 | 访问验证错误 |
2005-05-02 00:00:00 | 2005-10-20 00:00:00 |
远程 | |
Mozilla Browser和Firefox都是非常流行的开放源码WEB浏览器。
Mozilla和Firefox的JavaScript引擎中存在整数溢出漏洞,在有利的条件下,恶意的Web页面可能以运行Mozilla或Firefox用户的权限执行任意代码。 |
- 公告与补丁
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
Mozilla Upgrade Firefox 1.0.7 http://www.mozilla.org/products/firefox/ Mozilla Upgrade Mozilla 1.7.12 http://www.mozilla.org/products/mozilla1.x/ |
- 漏洞信息 (F39036)
Ubuntu Security Notice 157-1 (PacketStormID:F39036) |
2005-08-05 00:00:00 |
Ubuntu ubuntu.com |
advisory,vulnerability |
linux,ubuntu |
CVE-2005-0989,CVE-2005-1159,CVE-2005-1160,CVE-2005-1532,CVE-2005-2261,CVE-2005-2265,CVE-2005-2269,CVE-2005-2270,CVE-2005-2353 |
[点击下载] |
Ubuntu Security Notice USN-157-1 - A multitude of Mozilla Thunderbird vulnerabilities have been addressed in this advisory. |
========================================================== Ubuntu Security Notice USN-157-1 August 01, 2005 mozilla-thunderbird vulnerabilities CAN-2005-0989, CAN-2005-1159, CAN-2005-1160, CAN-2005-1532, CAN-2005-2261, CAN-2005-2265, CAN-2005-2269, CAN-2005-2270, CAN-2005-2353 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) The following packages are affected: mozilla-thunderbird mozilla-thunderbird-enigmail The problem can be corrected by upgrading the affected package to version 1.0.6-0ubuntu04.10 (for Ubuntu 4.10), or 1.0.6-0ubuntu05.04 (for Ubuntu 5.04). You need to restart Thunderbird after a standard system upgrade to effect the necessary changes. The current Enigmail plugin is not compatible any more with the Thunderbird version shipped in this security update, so the mozilla-thunderbird-enigmail package needs to be updated as well. An update is already available for Ubuntu 5.04, and will be delivered shortly for Ubuntu 4.10. Details follow: Vladimir V. Perepelitsa discovered a bug in Thunderbird's handling of anonymous functions during regular expression string replacement. A malicious HTML email could exploit this to capture a random block of client memory. (CAN-2005-0989) Georgi Guninski discovered that the types of certain XPInstall related JavaScript objects were not sufficiently validated when they were called. This could be exploited by malicious HTML email content to crash Thunderbird or even execute arbitrary code with the privileges of the user. (CAN-2005-1159) Thunderbird did not properly verify the values of XML DOM nodes. By tricking the user to perform a common action like clicking on a link or opening the context menu, a malicious HTML email could exploit this to execute arbitrary JavaScript code with the full privileges of the user. (CAN-2005-1160) A variant of the attack described in CAN-2005-1160 (see USN-124-1) was discovered. Additional checks were added to make sure Javascript eval and script objects are run with the privileges of the context that created them, not the potentially elevated privilege of the context calling them. (CAN-2005-1532) Scripts in XBL controls from web content continued to be run even when Javascript was disabled. This could be combined with most script-based exploits to attack people running vulnerable versions who thought disabling Javascript would protect them. (CAN-2005-2261) The function for version comparison in the addons installer did not properly verify the type of its argument. By passing specially crafted Javascript objects to it, a malicious web site could crash Thunderbird and possibly even execute arbitrary code with the privilege of the user account Thunderbird runs in. (CAN-2005-2265) The XHTML DOM node handler did not take namespaces into account when verifying node types based on their names. For example, an XHTML email could contain an <IMG> tag with malicious contents, which would then be processed as the standard trusted HTML <img> tag. By tricking an user to view a malicious email, this could be exploited to execute attacker-specified code with the full privileges of the user. (CAN-2005-2269) It was discovered that some objects were not created appropriately. This allowed malicious web content scripts to trace back the creation chain until they found a privileged object and execute code with higher privileges than allowed by the current site. (CAN-2005-2270) Javier Fern
- 漏洞信息
15690 | |
Mozilla Multiple Browser DOM Property Override Privilege Escalation | |
Remote / Network Access | Input Manipulation |
Loss of Integrity | |
Exploit Public | Vendor Verified |
- 漏洞描述
Multiple browser contains a flaw that may allow a remote attacker to gain access to unauthorized privileges. The issue is triggered due to improper validation of privileged 'chrome' UI code in DOM nodes. By creating a malicious script and tricking a victim to open the script or the context menu, a remote attacker could override properties and methods of DOM nodes and execute arbitrary code, resulting in a loss of integrity. |
- 时间线
2005-04-18 | Unknow |
2005-04-18 | Unknow |
- 解决方案
Upgrade to Firefox version 1.0.3 or Mozilla version 1.7.7 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround: Disable Javascript. |
- 相关参考
漏洞作者
- 漏洞信息
Mozilla Suite And Firefox Document Object Model Nodes Code Execution Vulnerability | |
Access Validation Error | 13233 |
Yes | No |
2005-04-16 12:00:00 | 2007-02-22 04:46:00 |
moz_bug_r_a4 is credited with the discovery of this issue. Juha-Matti Laurio reported that this issue also affects Netscape. |
- 受影响的程序版本
Ubuntu Ubuntu Linux 5.0 4 powerpc Ubuntu Ubuntu Linux 5.0 4 i386 Ubuntu Ubuntu Linux 5.0 4 amd64 Ubuntu Ubuntu Linux 4.1 ppc Ubuntu Ubuntu Linux 4.1 ia64 Ubuntu Ubuntu Linux 4.1 ia32 SuSE SUSE Linux Enterprise Server 8 SGI ProPack 3.0 SCO Unixware 7.1.4 S.u.S.E. Novell Linux Desktop 9.0 S.u.S.E. Linux Professional 10.0 OSS S.u.S.E. Linux Professional 10.0 S.u.S.E. Linux Professional 9.3 x86_64 S.u.S.E. Linux Professional 9.3 S.u.S.E. Linux Professional 9.2 x86_64 S.u.S.E. Linux Professional 9.2 S.u.S.E. Linux Professional 9.1 x86_64 S.u.S.E. Linux Professional 9.1 S.u.S.E. Linux Personal 10.0 OSS S.u.S.E. Linux Personal 9.3 x86_64 S.u.S.E. Linux Personal 9.3 S.u.S.E. Linux Personal 9.2 x86_64 S.u.S.E. Linux Personal 9.2 S.u.S.E. Linux Personal 9.1 x86_64 S.u.S.E. Linux Personal 9.1 S.u.S.E. Linux Personal 9.0 x86_64 S.u.S.E. Linux Personal 9.0 S.u.S.E. Linux Personal 8.2 S.u.S.E. Linux Enterprise Server 9 S.u.S.E. Linux Desktop 1.0 RedHat Linux 9.0 i386 RedHat Linux 7.3 i686 RedHat Linux 7.3 i386 RedHat Linux 7.3 RedHat Enterprise Linux WS 3 RedHat Enterprise Linux WS 2.1 RedHat Enterprise Linux ES 3 RedHat Enterprise Linux ES 2.1 RedHat Desktop 3.0 RedHat Advanced Workstation for the Itanium Processor 2.1 Red Hat Fedora Core4 Red Hat Fedora Core3 Red Hat Fedora Core2 Red Hat Fedora Core1 Red Hat Enterprise Linux AS 3 Red Hat Enterprise Linux AS 2.1 Netscape Netscape 7.2 Netscape Netscape 7.1 Netscape Netscape 7.0 Netscape Navigator 7.2 Netscape Navigator 7.1 Netscape Navigator 7.0.2 Netscape Navigator 7.0 Mozilla Firefox 1.0.2 Mozilla Firefox 1.0.1 Mozilla Firefox 1.0 Mozilla Firefox 0.10.1 Mozilla Firefox 0.10 Mozilla Firefox 0.9.3 Mozilla Firefox 0.9.2 Mozilla Firefox 0.9.1 Mozilla Firefox 0.9 rc Mozilla Firefox 0.9 Mozilla Firefox 0.8 Mozilla Browser 1.7.6 Mozilla Browser 1.7.5 Mozilla Browser 1.7.4 Mozilla Browser 1.7.3 Mozilla Browser 1.7.2 Mozilla Browser 1.7.1 Mozilla Browser 1.7 rc3 Mozilla Browser 1.7 rc2 Mozilla Browser 1.7 rc1 Mozilla Browser 1.7 beta Mozilla Browser 1.7 alpha Mozilla Browser 1.7 Mandriva Linux Mandrake 10.2 x86_64 Mandriva Linux Mandrake 10.2 Mandriva Linux Mandrake 10.1 x86_64 Mandriva Linux Mandrake 10.1 MandrakeSoft Corporate Server 3.0 x86_64 MandrakeSoft Corporate Server 3.0 HP HP-UX B.11.23 HP HP-UX B.11.22 HP HP-UX B.11.11 HP HP-UX B.11.00 Debian Linux 3.1 sparc Debian Linux 3.1 s/390 Debian Linux 3.1 ppc Debian Linux 3.1 mipsel Debian Linux 3.1 mips Debian Linux 3.1 m68k Debian Linux 3.1 ia-64 Debian Linux 3.1 ia-32 Debian Linux 3.1 hppa Debian Linux 3.1 arm Debian Linux 3.1 amd64 Debian Linux 3.1 alpha Debian Linux 3.1 Netscape Netscape 8.0 Mozilla Firefox 1.0.3 Mozilla Browser 1.7.7 |
- 不受影响的程序版本
Netscape Netscape 8.0 Mozilla Firefox 1.0.3 Mozilla Browser 1.7.7 |
- 漏洞讨论
Mozilla Suite and Mozilla Firefox are affected by a code-execution vulnerability. This issue is due to a failure in the application to properly verify Document Object Model (DOM) property values. An attacker may leverage this issue to execute arbitrary code with the privileges of the user that activated the vulnerable browser, ultimately facilitating a compromise of the affected computer. Note that this issue was previously reported in BID 13208 (Mozilla Suite Multiple Code Execution, Cross-Site Scripting, And Policy Bypass Vulnerabilities); it has been assigned its own BID. |
- 漏洞利用
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com |
- 解决方案
- 相关参考
|