CVE-2006-1724
CVSS7.5
发布时间 :2006-04-14 06:02:00
修订时间 :2011-03-07 21:33:44
NMCOPS    

[原文]Unspecified vulnerability in Firefox and Thunderbird before 1.5.0.2, 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to DHTML.


[CNNVD]Mozilla Suite/Firefox/SeaMonkey/Thunderbird多个远程安全漏洞(CNNVD-200604-236)

        Mozilla Suite/Firefox/SeaMonkey/Thunderbird都是Mozilla发布的WEB浏览器和邮件新闻组客户端产品。
        上述产品中存在多个安全漏洞,具体如下:
        1) 攻击者可能通过DHTML相关的攻击导致拒绝服务或执行任意代码。
        2) Mozilla/Firefox和Thunderbird没有正确地处理CSS "letter-spacing"单元。攻击者可以通过指定很大的数值在内存分配期间溢出整数,导致堆溢出。成功利用这个漏洞的攻击者可以执行任意代码。
        3) 远程攻击者可以向文件框中注入目标文件名然后将该文本框转换为文件上传控件,或更改事件处理器相关的"y"类型,导致读取任意文件。
        4) 攻击者可以利用crypto.generateCRMFRequest方式以用户权限运行任意代码,可能安装恶意软件。
        5) 如果用户在"打印预览"下浏览页面的话,则攻击者可以使用XBL控件中的脚本获得chrome权限。
        6) 攻击者可以通过能够生成负数数组索引的无效且不易察觉的表格相关标签序列执行任意代码。
        7) 攻击者可以利用setTimeout()和新的Firefox 1.5数组方式ForEach绕过js_ValueToFunctionObject()中的安全检查,获得权限提升。
        8) XUL内容窗口与Firefox 1.5中新的faster history机制交互可能导致这些窗口变得半透明。攻击者可以利用这个漏洞诱骗用户与无法看到的窗口UI交互,导致执行任意代码。
        9) 如果没有参数便调用了.valueOf.call()和.valueOf.apply()的话,上述函数会返回Object类原型而不是调用者的全局窗口对象。如果调用了另一个窗口的可获得属性的话,这就允许攻击者绕过同源保护,向另一个窗口注入脚本。
        10) nsHTMLContentSink.cpp在解析特制序列的HTML标签时存在内存破坏漏洞,允许攻击者从栈控制函数指针引用,最终导致执行任意代码。
        11) 攻击者可以利用window.controllers数组绕过同源保护,向另一个站点注入脚本。这可能允许恶意页面窃取cookies或口令之类的信息。如果用户已经登录的话,还可以代表该用户执行操作。
        12) 特权的嵌入XBL绑定的编译范围没有得到正确的保护,攻击者可以通过调用valueOf.call()和alueOf.apply(),或向DOM的document.body原型链中注入XBL方式访问XBL绑定,然后编译并运行攻击者所提供的JavaScript。
        13) 攻击者可以利用Object.watch()方式访问内部函数对象(clone parent),然后以完全权限运行任意JavaScript代码。
        14) 攻击者可以利用与XBL绑定方式相关的求值创建可由错误权限编译的JavaScript函数,这样攻击者就可以以完全的用户权限运行代码。
        15) 通过在可视图形上放置到可执行程序的透明图形链接,恶意站点可以诱骗用户右击并选择"图形另存为...",保存可执行程序而不是所预期的图形。之后如果攻击者双击了所保存的"图形"的话,就会执行攻击者所提供的恶意程序。
        如果要利用这个漏洞,攻击者必须在扩展名前放置很多空格,以便将扩展名挤出标准文件保存对话框之外,这样在下载的时候默认的Windows行为会隐藏起扩展名。例如,类似于"bikini.jpg .exe"的扩展名看起来会像是合法的图形文件。此外,攻击者还可以将常见的图形图形嵌入到可执行程序以便进一步迷惑用户。
        16) 远程攻击者可以利用有很大正则表达式的JavaScript、InstallTrigger.install方式、通过更改-moz-grid和-moz-grid-group显示样式,或某些能够导致越界数组写入和缓冲区溢出的级联样式表(CSS)导致拒绝服务,或执行任意代码。
        17) 攻击者可以通过首先在弹出窗口中加载目标安全站点然后将站点位置更改至不同位置的方式欺骗浏览器的安全站点标识符。如果用户打开了"输入安全站点"模式警告对话框的话,就可以在显示对话框的时候更改窗口位置,而原始站点的安全浏览标识符保持不变。
        18) 如果启用了"禁止在邮件消息中加载远程图形"的话,HTML渲染引擎就无法正确的阻断在线HTML附件中的外部图形,这允许在用户读取邮件并访问外部图形时泄漏敏感信息,如应用程序版本或IP地址。
        
        
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:mozilla:firefox:1.5:beta1Mozilla Firefox 1.5 Beta 1
cpe:/a:mozilla:mozilla_suite:1.7.8Mozilla Mozilla Suite 1.7.8
cpe:/a:mozilla:firefox:1.5.0.1Mozilla Firefox 1.5.0.1
cpe:/a:mozilla:thunderbird:1.0.7Mozilla Thunderbird 1.0.7
cpe:/a:mozilla:mozilla_suite:1.7.6Mozilla Mozilla Suite 1.7.6
cpe:/a:mozilla:firefox:1.0.5Mozilla Firefox 1.0.5
cpe:/a:mozilla:firefox:1.0.4Mozilla Firefox 1.0.4
cpe:/a:mozilla:thunderbird:1.5:beta2Mozilla Thunderbird 1.5 Beta 2
cpe:/a:mozilla:firefox:1.0.6Mozilla Firefox 1.0.6
cpe:/a:mozilla:firefox:1.0.7Mozilla Firefox 1.0.7
cpe:/a:mozilla:thunderbird:1.5.0.1Mozilla Thunderbird 1.5.0.1
cpe:/a:mozilla:thunderbird:1.0Mozilla Thunderbird 1.0
cpe:/a:mozilla:seamonkey:1.0::alpha
cpe:/a:mozilla:firefox:1.0.3Mozilla Firefox 1.0.3
cpe:/a:mozilla:thunderbird:1.0.4Mozilla Thunderbird 1.0.4
cpe:/a:mozilla:thunderbird:1.5Mozilla Thunderbird 1.5
cpe:/a:mozilla:firefox:1.0.1Mozilla Firefox 1.0.1
cpe:/a:mozilla:seamonkey:1.0:betaMozilla SeaMonkey 1.0 beta
cpe:/a:mozilla:thunderbird:1.0.5:betaMozilla Thunderbird 1.0.5 Beta
cpe:/a:mozilla:firefox:1.0.2Mozilla Firefox 1.0.2
cpe:/a:mozilla:firefox:1.5Mozilla Firefox 1.5
cpe:/a:mozilla:thunderbird:1.0.5Mozilla Thunderbird 1.0.5
cpe:/a:mozilla:thunderbird:1.0.1Mozilla Thunderbird 1.0.1
cpe:/a:mozilla:mozilla_suite:1.7.12Mozilla Mozilla Suite 1.7.12
cpe:/a:mozilla:mozilla_suite:1.7.11Mozilla Mozilla Suite 1.7.11
cpe:/a:mozilla:mozilla_suite:1.7.7Mozilla Mozilla Suite 1.7.7
cpe:/a:mozilla:firefox:1.0Mozilla Firefox 1.0
cpe:/a:mozilla:firefox:1.5:beta2Mozilla Firefox 1.5 Beta 2
cpe:/a:mozilla:thunderbird:1.0.3Mozilla Thunderbird 1.0.3
cpe:/a:mozilla:thunderbird:1.0.2Mozilla Thunderbird 1.0.2
cpe:/a:mozilla:thunderbird:1.0.6Mozilla Thunderbird 1.0.6
cpe:/a:mozilla:mozilla_suite:1.7.10Mozilla Mozilla Suite 1.7.10

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:1901Mozilla Crashes with Evidence of Memory Corruption (CVE-2006-1724)
oval:org.mitre.oval:def:10243Unspecified vulnerability in Firefox and Thunderbird before 1.5.0.2, 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1724
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1724
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200604-236
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA06-107A.html
(UNKNOWN)  CERT  TA06-107A
http://www.kb.cert.org/vuls/id/350262
(UNKNOWN)  CERT-VN  VU#350262
https://bugzilla.mozilla.org/show_bug.cgi?id=282105
(UNKNOWN)  MISC  https://bugzilla.mozilla.org/show_bug.cgi?id=282105
http://www.vupen.com/english/advisories/2008/0083
(UNKNOWN)  VUPEN  ADV-2008-0083
http://www.vupen.com/english/advisories/2006/3749
(UNKNOWN)  VUPEN  ADV-2006-3749
http://www.vupen.com/english/advisories/2006/3748
(UNKNOWN)  VUPEN  ADV-2006-3748
http://www.vupen.com/english/advisories/2006/1356
(UNKNOWN)  VUPEN  ADV-2006-1356
http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded
(UNKNOWN)  HP  HPSBUX02153
http://www.securityfocus.com/archive/1/archive/1/446657/100/200/threaded
(UNKNOWN)  HP  SSRT061236
http://www.securityfocus.com/archive/1/archive/1/434524/100/0/threaded
(UNKNOWN)  HP  SSRT061145
http://www.mozilla.org/security/announce/2006/mfsa2006-20.html
(UNKNOWN)  CONFIRM  http://www.mozilla.org/security/announce/2006/mfsa2006-20.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1
(UNKNOWN)  SUNALERT  228526
http://www.securityfocus.com/bid/17516
(UNKNOWN)  BID  17516
http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded
(UNKNOWN)  HP  HPSBUX02153
http://www.securityfocus.com/archive/1/archive/1/446657/100/200/threaded
(UNKNOWN)  HP  HPSBUX02156
http://www.securityfocus.com/archive/1/archive/1/436338/100/0/threaded
(UNKNOWN)  FEDORA  FLSA:189137-2
http://www.securityfocus.com/archive/1/archive/1/434524/100/0/threaded
(UNKNOWN)  HP  HPSBTU02118
http://www.redhat.com/support/errata/RHSA-2006-0330.html
(UNKNOWN)  REDHAT  RHSA-2006:0330
http://www.redhat.com/support/errata/RHSA-2006-0328.html
(UNKNOWN)  REDHAT  RHSA-2006:0328
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html
(UNKNOWN)  FEDORA  FEDORA-2006-411
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html
(UNKNOWN)  FEDORA  FEDORA-2006-410
http://www.debian.org/security/2006/dsa-1051
(UNKNOWN)  DEBIAN  DSA-1051
http://www.debian.org/security/2006/dsa-1046
(UNKNOWN)  DEBIAN  DSA-1046
http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1
(UNKNOWN)  SUNALERT  102550
http://securitytracker.com/id?1015921
(UNKNOWN)  SECTRACK  1015921
http://securitytracker.com/id?1015920
(UNKNOWN)  SECTRACK  1015920
http://securitytracker.com/id?1015919
(UNKNOWN)  SECTRACK  1015919
http://secunia.com/advisories/22066
(UNKNOWN)  SECUNIA  22066
http://secunia.com/advisories/22065
(UNKNOWN)  SECUNIA  22065
http://secunia.com/advisories/21622
(UNKNOWN)  SECUNIA  21622
http://secunia.com/advisories/21033
(UNKNOWN)  SECUNIA  21033
http://secunia.com/advisories/19941
(UNKNOWN)  SECUNIA  19941
http://secunia.com/advisories/19863
(UNKNOWN)  SECUNIA  19863
http://secunia.com/advisories/19780
(UNKNOWN)  SECUNIA  19780
http://secunia.com/advisories/19714
(UNKNOWN)  SECUNIA  19714
http://secunia.com/advisories/19696
(UNKNOWN)  SECUNIA  19696
http://secunia.com/advisories/19649
(UNKNOWN)  SECUNIA  19649
http://secunia.com/advisories/19631
(UNKNOWN)  SECUNIA  19631
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt
(UNKNOWN)  SCO  SCOSA-2006.26

- 漏洞信息

Mozilla Suite/Firefox/SeaMonkey/Thunderbird多个远程安全漏洞
高危 资料不足
2006-04-14 00:00:00 2009-02-05 00:00:00
远程  
        Mozilla Suite/Firefox/SeaMonkey/Thunderbird都是Mozilla发布的WEB浏览器和邮件新闻组客户端产品。
        上述产品中存在多个安全漏洞,具体如下:
        1) 攻击者可能通过DHTML相关的攻击导致拒绝服务或执行任意代码。
        2) Mozilla/Firefox和Thunderbird没有正确地处理CSS "letter-spacing"单元。攻击者可以通过指定很大的数值在内存分配期间溢出整数,导致堆溢出。成功利用这个漏洞的攻击者可以执行任意代码。
        3) 远程攻击者可以向文件框中注入目标文件名然后将该文本框转换为文件上传控件,或更改事件处理器相关的"y"类型,导致读取任意文件。
        4) 攻击者可以利用crypto.generateCRMFRequest方式以用户权限运行任意代码,可能安装恶意软件。
        5) 如果用户在"打印预览"下浏览页面的话,则攻击者可以使用XBL控件中的脚本获得chrome权限。
        6) 攻击者可以通过能够生成负数数组索引的无效且不易察觉的表格相关标签序列执行任意代码。
        7) 攻击者可以利用setTimeout()和新的Firefox 1.5数组方式ForEach绕过js_ValueToFunctionObject()中的安全检查,获得权限提升。
        8) XUL内容窗口与Firefox 1.5中新的faster history机制交互可能导致这些窗口变得半透明。攻击者可以利用这个漏洞诱骗用户与无法看到的窗口UI交互,导致执行任意代码。
        9) 如果没有参数便调用了.valueOf.call()和.valueOf.apply()的话,上述函数会返回Object类原型而不是调用者的全局窗口对象。如果调用了另一个窗口的可获得属性的话,这就允许攻击者绕过同源保护,向另一个窗口注入脚本。
        10) nsHTMLContentSink.cpp在解析特制序列的HTML标签时存在内存破坏漏洞,允许攻击者从栈控制函数指针引用,最终导致执行任意代码。
        11) 攻击者可以利用window.controllers数组绕过同源保护,向另一个站点注入脚本。这可能允许恶意页面窃取cookies或口令之类的信息。如果用户已经登录的话,还可以代表该用户执行操作。
        12) 特权的嵌入XBL绑定的编译范围没有得到正确的保护,攻击者可以通过调用valueOf.call()和alueOf.apply(),或向DOM的document.body原型链中注入XBL方式访问XBL绑定,然后编译并运行攻击者所提供的JavaScript。
        13) 攻击者可以利用Object.watch()方式访问内部函数对象(clone parent),然后以完全权限运行任意JavaScript代码。
        14) 攻击者可以利用与XBL绑定方式相关的求值创建可由错误权限编译的JavaScript函数,这样攻击者就可以以完全的用户权限运行代码。
        15) 通过在可视图形上放置到可执行程序的透明图形链接,恶意站点可以诱骗用户右击并选择"图形另存为...",保存可执行程序而不是所预期的图形。之后如果攻击者双击了所保存的"图形"的话,就会执行攻击者所提供的恶意程序。
        如果要利用这个漏洞,攻击者必须在扩展名前放置很多空格,以便将扩展名挤出标准文件保存对话框之外,这样在下载的时候默认的Windows行为会隐藏起扩展名。例如,类似于"bikini.jpg .exe"的扩展名看起来会像是合法的图形文件。此外,攻击者还可以将常见的图形图形嵌入到可执行程序以便进一步迷惑用户。
        16) 远程攻击者可以利用有很大正则表达式的JavaScript、InstallTrigger.install方式、通过更改-moz-grid和-moz-grid-group显示样式,或某些能够导致越界数组写入和缓冲区溢出的级联样式表(CSS)导致拒绝服务,或执行任意代码。
        17) 攻击者可以通过首先在弹出窗口中加载目标安全站点然后将站点位置更改至不同位置的方式欺骗浏览器的安全站点标识符。如果用户打开了"输入安全站点"模式警告对话框的话,就可以在显示对话框的时候更改窗口位置,而原始站点的安全浏览标识符保持不变。
        18) 如果启用了"禁止在邮件消息中加载远程图形"的话,HTML渲染引擎就无法正确的阻断在线HTML附件中的外部图形,这允许在用户读取邮件并访问外部图形时泄漏敏感信息,如应用程序版本或IP地址。
        
        
        

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Sun Solaris 10.0
        Sun 119115-21
        http://sunsolve.sun.com/
        Sun Solaris 8
        Sun 120671-03
        http://sunsolve.sun.com/patches/
        HP HP-UX B.11.23
        HP Firefox v2.0.0.4
        http://www.hp.com/products1/unix/java/firefox/downloads/license_firefo x_2-0-0-4.html
        HP thunderbird_1.5.0.9_ia.depot.gz
        For HP-UX B.11.23 and B.11.31 (IA)
        http://www.hp.com/products1/unix/java/firefox/downloads/license_thunde rbird_1-5-0-8.html
        HP thunderbird_1.5.0.9_pa.depot.gz
        For HP-UX B.11.11, B.11.23, and B.11.31 (PA)
        http://www.hp.com/products1/unix/java/firefox/downloads/license_thunde rbird_1-5-0-8.html
        HP HP-UX B.11.11
        HP Firefox v2.0.0.4
        http://www.hp.com/products1/unix/java/firefox/downloads/license_firefo x_2-0-0-4.html
        HP thunderbird_1.5.0.9_pa.depot.gz
        For HP-UX B.11.11, B.11.23, and B.11.31 (PA)
        http://www.hp.com/products1/unix/java/firefox/downloads/license_thunde rbird_1-5-0-8.html
        Mozilla Thunderbird 0.8
        Fedora Legacy thunderbird-1.0.8-1.1.fc3.4.legacy.i386.rpm
        Fedora Core 3:
        http://download.fedoralegacy.org/fedora/3/updates/i386/thunderbird-1.0 .8-1.1.fc3.4.legacy.i386.rpm
        Fedora Legacy thunderbird-1.0.8-1.1.fc3.4.legacy.x86_64.rpm
        Fedora Core 3:
        http://download.fedoralegacy.org/fedora/3/updates/x86_64/thunderbird-1 .0.8-1.1.fc3.4.legacy.x86_64.rpm
        Mozilla Firefox 1.0.4
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_alpha.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_alpha.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_amd64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_amd64.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_arm.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_arm.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_hppa.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_hppa.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_i386.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_i386.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_ia64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_ia64.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_m68k.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_m68k.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_mips.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_mips.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_mipsel.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_mipsel.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_powerpc.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_powerpc.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_s390.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_s390.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_sparc.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_sparc.deb
        Debian mozilla-firefox-gnome-support_1.0.4-2sarge6_alpha.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-gnome-support_1.

- 漏洞信息 (F46106)

Debian Linux Security Advisory 1051-1 (PacketStormID:F46106)
2006-05-06 00:00:00
Debian  debian.org
advisory
linux,debian
CVE-2005-2353,CVE-2005-4134,CVE-2006-0292,CVE-2006-0293,CVE-2006-0296,CVE-2006-0748,CVE-2006-0749,CVE-2006-0884,CVE-2006-1045,CVE-2006-1529,CVE-2006-1530,CVE-2006-1531,CVE-2006-1723,CVE-2006-1724,CVE-2006-1727,CVE-2006-1728,CVE-2006-1729,CVE-2006-1730
[点击下载]

Debian Security Advisory 1051-1 - Several security related problems have been discovered in Mozilla Thunderbird. This advisory addresses those issues.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1051-1                    security@debian.org
http://www.debian.org/security/                             Martin Schulze
May 4th, 2006                           http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : mozilla-thunderbird
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2005-2353 CVE-2005-4134 CVE-2006-0292 CVE-2006-0293
                 CVE-2006-0296 CVE-2006-0748 CVE-2006-0749 CVE-2006-0884
                 CVE-2006-1045 CVE-2006-1529 CVE-2006-1530 CVE-2006-1531
                 CVE-2006-1723 CVE-2006-1724 CVE-2006-1727 CVE-2006-1728
                 CVE-2006-1729 CVE-2006-1730 CVE-2006-1731 CVE-2006-1733
                 CVE-2006-1734 CVE-2006-1735 CVE-2006-1736 CVE-2006-1737
                 CVE-2006-1738 CVE-2006-1739 CVE-2006-1740 CVE-2006-1741
                 CVE-2006-1742 CVE-2006-1790
CERT advisories: VU#179014 VU#252324 VU#329500 VU#350262 VU#488774 VU#492382
                 VU#592425 VU#736934 VU#813230 VU#842094 VU#932734 VU#935556
BugTraq IDs    : 15773 16476 16476 16770 16881 17516

Several security related problems have been discovered in Mozilla
Thunderbird.  The Common Vulnerabilities and Exposures project
identifies the following vulnerabilities:

CVE-2005-2353

    The "run-mozilla.sh" script allows local users to create or
    overwrite arbitrary files when debugging is enabled via a symlink
    attack on temporary files.

CVE-2005-4134

    Web pages with extremely long titles cause subsequent launches of
    the browser to appear to "hang" for up to a few minutes, or even
    crash if the computer has insufficient memory.  [MFSA-2006-03]

CVE-2006-0292

    The Javascript interpreter does not properly dereference objects,
    which allows remote attackers to cause a denial of service or
    execute arbitrary code.  [MFSA-2006-01]

CVE-2006-0293

    The function allocation code allows attackers to cause a denial of
    service and possibly execute arbitrary code.  [MFSA-2006-01]

CVE-2006-0296

    XULDocument.persist() did not validate the attribute name,
    allowing an attacker to inject arbitrary XML and JavaScript code
    into localstore.rdf that would be read and acted upon during
    startup.  [MFSA-2006-05]

CVE-2006-0748

    An anonymous researcher for TippingPoint and the Zero Day
    Initiative reported that an invalid and nonsensical ordering of
    table-related tags can be exploited to execute arbitrary code.
    [MFSA-2006-27]

CVE-2006-0749

    A particular sequence of HTML tags can cause memory corruption
    that can be exploited to exectute arbitary code.  [MFSA-2006-18]

CVE-2006-0884

    Georgi Guninski reports that forwarding mail in-line while using
    the default HTML "rich mail" editor will execute JavaScript
    embedded in the e-mail message with full privileges of the client.
    [MFSA-2006-21]

CVE-2006-1045

    The HTML rendering engine does not properly block external images
    from inline HTML attachments when "Block loading of remote images
    in mail messages" is enabled, which could allow remote attackers
    to obtain sensitive information.  [MFSA-2006-26]

CVE-2006-1529

    A vulnerability potentially allows remote attackers to cause a
    denial of service and possibly execute arbitrary.  [MFSA-2006-20]

CVE-2006-1530

    A vulnerability potentially allows remote attackers to cause a
    denial of service and possibly execute arbitrary.  [MFSA-2006-20]

CVE-2006-1531

    A vulnerability potentially allows remote attackers to cause a
    denial of service and possibly execute arbitrary.  [MFSA-2006-20]

CVE-2006-1723

    A vulnerability potentially allows remote attackers to cause a
    denial of service and possibly execute arbitrary.  [MFSA-2006-20]

CVE-2006-1724

    A vulnerability potentially allows remote attackers to cause a
    denial of service and possibly execute arbitrary.  [MFSA-2006-20]

CVE-2006-1727

    Georgi Guninski reported two variants of using scripts in an XBL
    control to gain chrome privileges when the page is viewed under
    "Print Preview".under "Print Preview".  [MFSA-2006-25]

CVE-2006-1728

    "shutdown" discovered that the crypto.generateCRMFRequest method
    can be used to run arbitrary code with the privilege of the user
    running the browser, which could enable an attacker to install
    malware.  [MFSA-2006-24]

CVE-2006-1729

    Claus J    

- 漏洞信息

24672
Mozilla Multiple Products DHTML Unspecified Memory Corruption (282105)
Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-04-13 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Mozilla Suite, Firefox, SeaMonkey, and Thunderbird Multiple Remote Vulnerabilities
Unknown 17516
Yes No
2006-04-13 12:00:00 2008-09-10 08:20:00
TippingPoint and the Zero Day Initiative, Claus Jørgensen, shutdown, Georgi Guninski, CrashFr, moz_bug_r_a4, and various other currently-unknown people are credited for discovering these issues.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 4.1 ppc
Ubuntu Ubuntu Linux 4.1 ia64
Ubuntu Ubuntu Linux 4.1 ia32
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
Sun Solaris 9_x86
Sun Solaris 9
Sun Solaris 8_x86
Sun Solaris 8_sparc
Sun Solaris 10_x86
Sun Solaris 10.0_x86
Sun Solaris 10.0
Sun Solaris 10
Sun Java Desktop System (JDS) 2.0
Slackware Linux 10.2
Slackware Linux 10.1
Slackware Linux 10.0
Slackware Linux -current
SCO Unixware 7.1.4
SCO Unixware 7.1.3
S.u.S.E. UnitedLinux 1.0
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Desktop 1.0
RedHat Linux 9.0 i386
RedHat Linux 7.3 i686
RedHat Linux 7.3 i386
RedHat Linux 7.3
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1 IA64
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1 IA64
RedHat Enterprise Linux ES 2.1
RedHat Desktop 4.0
RedHat Desktop 3.0
RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
RedHat Advanced Workstation for the Itanium Processor 2.1
Red Hat Fedora Core5
Red Hat Fedora Core4
Red Hat Fedora Core3
Red Hat Fedora Core2
Red Hat Fedora Core1
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
Red Hat Enterprise Linux AS 2.1 IA64
Red Hat Enterprise Linux AS 2.1
Netscape Netscape 7.2
Netscape Browser 8.0.4
Mozilla Thunderbird 1.5 beta 2
Mozilla Thunderbird 1.5
Mozilla Thunderbird 1.0.7
Mozilla Thunderbird 1.0.6
Mozilla Thunderbird 1.0.5
Mozilla Thunderbird 1.0.2
Mozilla Thunderbird 1.0.1
Mozilla Thunderbird 1.0
Mozilla Thunderbird 0.9
Mozilla Thunderbird 0.8
Mozilla Thunderbird 0.7.3
Mozilla Thunderbird 0.7.2
Mozilla Thunderbird 0.7.1
Mozilla Thunderbird 0.7
Mozilla Thunderbird 0.6
Mozilla Thunderbird 1.5.0.1
Mozilla SeaMonkey 1.0 dev
Mozilla SeaMonkey 1.0
Mozilla Firefox 1.5 beta 2
Mozilla Firefox 1.5 beta 1
Mozilla Firefox 1.5
Mozilla Firefox 1.0.7
Mozilla Firefox 1.0.6
Mozilla Firefox 1.0.5
Mozilla Firefox 1.0.5
Mozilla Firefox 1.0.4
Mozilla Firefox 1.0.3
Mozilla Firefox 1.0.2
+ Mandriva Linux Mandrake 10.2 x86_64
+ Mandriva Linux Mandrake 10.2
+ Mandriva Linux Mandrake 10.2
+ Red Hat Enterprise Linux AS 4
+ Red Hat Enterprise Linux AS 4
+ RedHat Desktop 4.0
+ RedHat Desktop 4.0
+ RedHat Enterprise Linux ES 4
+ RedHat Enterprise Linux ES 4
+ RedHat Enterprise Linux WS 4
+ RedHat Enterprise Linux WS 4
Mozilla Firefox 1.0.1
Mozilla Firefox 1.0
Mozilla Firefox 0.10.1
Mozilla Firefox 0.10
Mozilla Firefox 0.9.3
Mozilla Firefox 0.9.2
Mozilla Firefox 0.9.1
Mozilla Firefox 0.9 rc
Mozilla Firefox 0.9
Mozilla Firefox 0.8
Mozilla Firefox Preview Release
Mozilla Firefox 1.5.0.1
Mozilla Browser 1.8 Alpha 4
Mozilla Browser 1.8 Alpha 3
Mozilla Browser 1.8 Alpha 2
Mozilla Browser 1.8 Alpha 1
Mozilla Browser 1.7.12
Mozilla Browser 1.7.11
Mozilla Browser 1.7.10
Mozilla Browser 1.7.9
Mozilla Browser 1.7.8
Mozilla Browser 1.7.7
+ Red Hat Enterprise Linux AS 4
+ Red Hat Enterprise Linux AS 4
+ RedHat Desktop 4.0
+ RedHat Desktop 4.0
+ RedHat Enterprise Linux ES 4
+ RedHat Enterprise Linux ES 4
+ RedHat Enterprise Linux WS 4
+ RedHat Enterprise Linux WS 4
+ Turbolinux Home
+ Turbolinux Home
+ Turbolinux Turbolinux 10 F...
+ Turbolinux Turbolinux 10 F...
+ Turbolinux Turbolinux Desktop 10.0
+ Turbolinux Turbolinux Desktop 10.0
+ Turbolinux Turbolinux Server 10.0
Mozilla Browser 1.7.6
Mozilla Browser 1.7.5
Mozilla Browser 1.7.4
Mozilla Browser 1.7.3
Mozilla Browser 1.7.2
Mozilla Browser 1.7.1
Mozilla Browser 1.7 rc3
Mozilla Browser 1.7 rc2
Mozilla Browser 1.7 rc1
Mozilla Browser 1.7 beta
Mozilla Browser 1.7 alpha
Mozilla Browser 1.7
Mozilla Browser 1.6
Mozilla Browser 1.5.1
Mozilla Browser 1.5
Mozilla Browser 1.4.4
Mozilla Browser 1.4.2
Mozilla Browser 1.4.1
Mozilla Browser 1.4 b
Mozilla Browser 1.4 a
Mozilla Browser 1.4
Mozilla Browser 1.3.1
Mozilla Browser 1.3
Mozilla Browser 1.2.1
Mozilla Browser 1.2 Beta
Mozilla Browser 1.2 Alpha
Mozilla Browser 1.2
Mozilla Browser 1.1 Beta
Mozilla Browser 1.1 Alpha
Mozilla Browser 1.1
Mozilla Browser 1.0.2
Mozilla Browser 1.0.1
Mozilla Browser 1.0 RC2
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ Conectiva Linux 6.0
Mozilla Browser 1.0 RC1
- FreeBSD FreeBSD 4.5
- FreeBSD FreeBSD 4.4
- FreeBSD FreeBSD 4.3
- FreeBSD FreeBSD 4.2
- FreeBSD FreeBSD 4.1.1
Mozilla Browser 1.0
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
+ RedHat Linux 8.0 i386
+ RedHat Linux 8.0
Mozilla Browser 0.9.48
Mozilla Browser 0.9.35
Mozilla Browser 0.9.9
Mozilla Browser 0.9.8
- Apple Mac OS 9 9.2.2
- Apple Mac OS 9 9.2.1
- Apple Mac OS 9 9.2.1
- Apple Mac OS 9 9.2
- Apple Mac OS 9 9.2
- Apple Mac OS 9 9.1
- Apple Mac OS 9 9.1
- Apple Mac OS 9 9.0.4
- Apple Mac OS 9 9.0.4
- Apple Mac OS 9 9.0
- Apple Mac OS 9 9.0
- Apple Mac OS X 10.1.2
- Apple Mac OS X 10.1.2
- Apple Mac OS X 10.1.1
- Apple Mac OS X 10.1.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.0.4
- Apple Mac OS X 10.0.4
- Apple Mac OS X 10.0.3
- Apple Mac OS X 10.0.3
- Apple Mac OS X 10.0.2
- Apple Mac OS X 10.0.2
- Apple Mac OS X 10.0.1
- Apple Mac OS X 10.0.1
- Apple Mac OS X 10.0
- Apple Mac OS X 10.0
- Microsoft Windows 95
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows ME
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
- Microsoft Windows XP 0
Mozilla Browser 0.9.7
- Apple Mac OS 9 9.2.1
- Apple Mac OS 9 9.2.1
- Apple Mac OS 9 9.2
- Apple Mac OS 9 9.2
- Apple Mac OS 9 9.1
- Apple Mac OS 9 9.1
- Apple Mac OS 9 9.0.4
- Apple Mac OS 9 9.0.4
- Apple Mac OS 9 9.0
- Apple Mac OS 9 9.0
- Apple Mac OS X 10.1.2
- Apple Mac OS X 10.1.2
- Apple Mac OS X 10.1.1
- Apple Mac OS X 10.1.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.0.4
- Apple Mac OS X 10.0.4
- Apple Mac OS X 10.0.3
- Apple Mac OS X 10.0.3
- Apple Mac OS X 10.0.2
- Apple Mac OS X 10.0.2
- Apple Mac OS X 10.0.1
- Apple Mac OS X 10.0.1
- Apple Mac OS X 10.0
- Apple Mac OS X 10.0
- Microsoft Windows 95
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows ME
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
- Microsoft Windows XP 0
Mozilla Browser 0.9.6
- Apple Mac OS 9 9.2
- Apple Mac OS 9 9.2
- Apple Mac OS 9 9.1
- Apple Mac OS 9 9.1
- Apple Mac OS 9 9.0
- Apple Mac OS 9 9.0
- Be BeOS 5.0
- Be BeOS 5.0
- BSDI BSD/OS 4.2
- BSDI BSD/OS 4.2
- Compaq OpenVMS 7.3 Alpha
- Compaq OpenVMS 7.3 Alpha
- Compaq OpenVMS 7.2 -2 Alpha
- Compaq OpenVMS 7.2 -2 Alpha
- Compaq OpenVMS 7.1 -2 Alpha
- FreeBSD FreeBSD 4.0
- FreeBSD FreeBSD 4.0
- IBM AIX 4.3.3
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows ME
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
- RedHat Linux 7.0 sparc
- RedHat Linux 7.0 sparc
- RedHat Linux 7.0 i386
- RedHat Linux 7.0 i386
- RedHat Linux 7.0 alpha
- RedHat Linux 7.0 alpha
- RedHat Linux 6.0 sparc
- RedHat Linux 6.0 sparc
- RedHat Linux 6.0 alpha
- RedHat Linux 6.0 alpha
- RedHat Linux 6.0
- RedHat Linux 6.0
- SGI IRIX 6.5
- SGI IRIX 6.5
- Sun Solaris 2.8
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.7
Mozilla Browser 0.9.5
Mozilla Browser 0.9.4 .1
Mozilla Browser 0.9.4
- Apple Mac OS 9 9.2.1
- Apple Mac OS 9 9.2.1
- Apple Mac OS 9 9.2
- Apple Mac OS 9 9.2
- Apple Mac OS 9 9.1
- Apple Mac OS 9 9.1
- Apple Mac OS 9 9.0.4
- Apple Mac OS 9 9.0.4
- Apple Mac OS 9 9.0
- Apple Mac OS 9 9.0
- Apple Mac OS X 10.1.2
- Apple Mac OS X 10.1.2
- Apple Mac OS X 10.1.1
- Apple Mac OS X 10.1.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.0.4
- Apple Mac OS X 10.0.4
- Apple Mac OS X 10.0.3
- Apple Mac OS X 10.0.3
- Apple Mac OS X 10.0.2
- Apple Mac OS X 10.0.2
- Apple Mac OS X 10.0.1
- Apple Mac OS X 10.0.1
- Apple Mac OS X 10.0
- Apple Mac OS X 10.0
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ Conectiva Linux 7.0
+ Conectiva Linux 6.0
+ Conectiva Linux 6.0
- Microsoft Windows 95
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows ME
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
- Microsoft Windows XP 0
Mozilla Browser 0.9.3
Mozilla Browser 0.9.2 .1
Mozilla Browser 0.9.2
- Apple Mac OS 9 9.2.1
- Apple Mac OS 9 9.2.1
- Apple Mac OS 9 9.2
- Apple Mac OS 9 9.2
- Apple Mac OS 9 9.1
- Apple Mac OS 9 9.1
- Apple Mac OS 9 9.0.4
- Apple Mac OS 9 9.0.4
- Apple Mac OS 9 9.0
- Apple Mac OS 9 9.0
- Apple Mac OS X 10.1.2
- Apple Mac OS X 10.1.2
- Apple Mac OS X 10.1.1
- Apple Mac OS X 10.1.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.0.4
- Apple Mac OS X 10.0.4
- Apple Mac OS X 10.0.3
- Apple Mac OS X 10.0.3
- Apple Mac OS X 10.0.2
- Apple Mac OS X 10.0.2
- Apple Mac OS X 10.0.1
- Apple Mac OS X 10.0.1
- Apple Mac OS X 10.0
- Apple Mac OS X 10.0
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ Conectiva Linux 7.0
+ Conectiva Linux 6.0
+ Conectiva Linux 6.0
- Microsoft Windows 95
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows ME
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
- Microsoft Windows XP 0
Mozilla Browser 0.8
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
Mozilla Browser M16
Mozilla Browser M15
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
HP HP-UX B.11.31
HP HP-UX B.11.23
HP HP-UX B.11.11
HP HP-UX B.11.11
HP HP-UX B.11.00
Gentoo Linux
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Mozilla Thunderbird 1.0.8
Mozilla Thunderbird 1.5.0.2
Mozilla SeaMonkey 1.0.1
Mozilla Firefox 1.0.8
Mozilla Firefox 1.5.0.2
Mozilla Browser 1.7.13

- 不受影响的程序版本

Mozilla Thunderbird 1.0.8
Mozilla Thunderbird 1.5.0.2
Mozilla SeaMonkey 1.0.1
Mozilla Firefox 1.0.8
Mozilla Firefox 1.5.0.2
Mozilla Browser 1.7.13

- 漏洞讨论

The Mozilla Foundation has released nine security advisories specifying security vulnerabilities in Mozilla Suite, Firefox, SeaMonkey, and Thunderbird.

These vulnerabilities allow attackers to:

- execute arbitrary machine code in the context of the vulnerable application
- crash affected applications
- gain elevated privileges in JavaScript code, potentially allowing remote machine code execution
- gain access to potentially sensitive information
- bypass security checks
- spoof window contents.

Other attacks may also be possible.

The issues described here will be split into individual BIDs as the information embargo on the Mozilla Bugzilla entries is lifted and as further information becomes available. This BID will then be retired.

These issues are fixed in:
- Mozilla Firefox versions 1.0.8 and 1.5.0.2
- Mozilla Thunderbird versions 1.0.8 and 1.5.0.2
- Mozilla Suite version 1.7.13
- Mozilla SeaMonkey version 1.0.1

- 漏洞利用

Some of the described vulnerabilities do not require exploits.

Proof-of-concept exploits are available in the Mozilla Bugzilla database, but they are not currently available to the general public.

- 解决方案

New versions of the Mozilla Suite, Firefox, SeaMonkey, and Thunderbird are available to address these issues. Most Mozilla applications have self-updating features that may be used to download and install fixes.

Please see the referenced advisories for information on obtaining and applying fixes.


Sun Solaris 10.0

Sun Solaris 8_sparc

HP HP-UX B.11.23

HP HP-UX B.11.11

Mozilla Thunderbird 0.8

Mozilla Firefox 1.0.4

Mozilla Browser 1.4.1

Mozilla Browser 1.6

SCO Unixware 7.1.4

S.u.S.E. Linux Professional 9.3

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站