CVE-2006-3811
CVSS7.5
发布时间 :2006-07-27 16:04:00
修订时间 :2011-03-07 21:39:31
NMCOP    

[原文]Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.


[CNNVD]Mozilla Firefox/SeaMonkey/Thunderbird 多个JAVA脚本拒绝服务攻击漏洞(CNNVD-200607-474)

        Mozilla Firefox/SeaMonkey/Thunderbird都是Mozilla发布的WEB浏览器和邮件新闻组客户端产品。
        上述产品中存在多个安全漏洞,具体如下:
        允许远程攻击者造成拒绝服务攻击(崩溃)和可能利用JAVA脚本导致内存溢出引起任意代码执行.这些漏洞包括:(1) nsListControlFrame::FireMenuItemActiveEvent, (2)string class缓冲区溢出 (3) 列表和栏目, (4) "UA样式表的匿名选择项," (5) removed nodes," 和(6)运行加密.CRMP请求恢复删除的文本

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:mozilla:firefox:1.5Mozilla Firefox 1.5
cpe:/a:mozilla:thunderbird:1.5.0.4Mozilla Thunderbird 1.5.0.4
cpe:/a:mozilla:firefox:1.5.0.4Mozilla Firefox 1.5.0.4
cpe:/a:mozilla:firefox:1.5.0.1Mozilla Firefox 1.5.0.1
cpe:/a:mozilla:thunderbird:1.5.0.2Mozilla Thunderbird 1.5.0.2
cpe:/a:mozilla:thunderbird:1.5Mozilla Thunderbird 1.5
cpe:/a:mozilla:seamonkey:1.0.2Mozilla SeaMonkey 1.0.2
cpe:/a:mozilla:seamonkey:1.0Mozilla SeaMonkey 1.0
cpe:/a:mozilla:firefox:1.5.0.2Mozilla Firefox 1.5.0.2
cpe:/a:mozilla:seamonkey:1.0::dev
cpe:/a:mozilla:seamonkey:1.0.1Mozilla SeaMonkey 1.0.1
cpe:/a:mozilla:firefox:1.5.0.3Mozilla Firefox 1.5.0.3

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9934Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3811
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200607-474
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA06-208A.html
(UNKNOWN)  CERT  TA06-208A
http://www.kb.cert.org/vuls/id/527676
(UNKNOWN)  CERT-VN  VU#527676
http://www.securityfocus.com/bid/19181
(PATCH)  BID  19181
http://secunia.com/advisories/21229
(VENDOR_ADVISORY)  SECUNIA  21229
http://secunia.com/advisories/21228
(VENDOR_ADVISORY)  SECUNIA  21228
http://secunia.com/advisories/21216
(VENDOR_ADVISORY)  SECUNIA  21216
http://secunia.com/advisories/19873
(VENDOR_ADVISORY)  SECUNIA  19873
https://issues.rpath.com/browse/RPL-537
(UNKNOWN)  CONFIRM  https://issues.rpath.com/browse/RPL-537
https://issues.rpath.com/browse/RPL-536
(UNKNOWN)  CONFIRM  https://issues.rpath.com/browse/RPL-536
http://xforce.iss.net/xforce/xfdb/27992
(UNKNOWN)  XF  mozilla-multiple-memory-corruption(27992)
http://www.vupen.com/english/advisories/2008/0083
(UNKNOWN)  VUPEN  ADV-2008-0083
http://www.vupen.com/english/advisories/2007/2350
(UNKNOWN)  VUPEN  ADV-2007-2350
http://www.vupen.com/english/advisories/2006/3749
(UNKNOWN)  VUPEN  ADV-2006-3749
http://www.vupen.com/english/advisories/2006/3748
(UNKNOWN)  VUPEN  ADV-2006-3748
http://www.vupen.com/english/advisories/2006/2998
(UNKNOWN)  VUPEN  ADV-2006-2998
http://www.ubuntulinux.org/support/documentation/usn/usn-329-1
(UNKNOWN)  UBUNTU  USN-329-1
http://www.ubuntulinux.org/support/documentation/usn/usn-327-1
(UNKNOWN)  UBUNTU  USN-327-1
http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded
(UNKNOWN)  HP  SSRT061181
http://www.securityfocus.com/archive/1/archive/1/446657/100/200/threaded
(UNKNOWN)  HP  HPSBUX02156
http://www.securityfocus.com/archive/1/archive/1/441333/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060727 rPSA-2006-0137-1 firefox
http://www.redhat.com/support/errata/RHSA-2006-0611.html
(UNKNOWN)  REDHAT  RHSA-2006:0611
http://www.redhat.com/support/errata/RHSA-2006-0610.html
(UNKNOWN)  REDHAT  RHSA-2006:0610
http://www.redhat.com/support/errata/RHSA-2006-0608.html
(UNKNOWN)  REDHAT  RHSA-2006:0608
http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html
(UNKNOWN)  SUSE  SUSE-SA:2006:048
http://www.mozilla.org/security/announce/2006/mfsa2006-55.html
(VENDOR_ADVISORY)  CONFIRM  http://www.mozilla.org/security/announce/2006/mfsa2006-55.html
http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml
(UNKNOWN)  GENTOO  GLSA-200608-03
http://securitytracker.com/id?1016588
(UNKNOWN)  SECTRACK  1016588
http://securitytracker.com/id?1016587
(UNKNOWN)  SECTRACK  1016587
http://securitytracker.com/id?1016586
(UNKNOWN)  SECTRACK  1016586
http://security.gentoo.org/glsa/glsa-200608-04.xml
(UNKNOWN)  GENTOO  GLSA-200608-04
http://security.gentoo.org/glsa/glsa-200608-02.xml
(UNKNOWN)  GENTOO  GLSA-200608-02
http://secunia.com/advisories/21607
(UNKNOWN)  SECUNIA  21607
http://secunia.com/advisories/21532
(UNKNOWN)  SECUNIA  21532
http://secunia.com/advisories/21529
(VENDOR_ADVISORY)  SECUNIA  21529
http://secunia.com/advisories/21361
(VENDOR_ADVISORY)  SECUNIA  21361
http://secunia.com/advisories/21358
(VENDOR_ADVISORY)  SECUNIA  21358
http://secunia.com/advisories/21343
(VENDOR_ADVISORY)  SECUNIA  21343
http://secunia.com/advisories/21336
(VENDOR_ADVISORY)  SECUNIA  21336
http://secunia.com/advisories/21275
(UNKNOWN)  SECUNIA  21275
http://secunia.com/advisories/21270
(UNKNOWN)  SECUNIA  21270
http://secunia.com/advisories/21269
(UNKNOWN)  SECUNIA  21269
http://secunia.com/advisories/21262
(VENDOR_ADVISORY)  SECUNIA  21262
http://secunia.com/advisories/21250
(VENDOR_ADVISORY)  SECUNIA  21250
http://secunia.com/advisories/21246
(UNKNOWN)  SECUNIA  21246
http://secunia.com/advisories/21243
(UNKNOWN)  SECUNIA  21243
http://rhn.redhat.com/errata/RHSA-2006-0609.html
(UNKNOWN)  REDHAT  RHSA-2006:0609
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
(VENDOR_ADVISORY)  SGI  20060703-01-P
http://www.ubuntu.com/usn/usn-361-1
(UNKNOWN)  UBUNTU  USN-361-1
http://www.ubuntu.com/usn/usn-354-1
(UNKNOWN)  UBUNTU  USN-354-1
http://www.ubuntu.com/usn/usn-350-1
(UNKNOWN)  UBUNTU  USN-350-1
http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded
(UNKNOWN)  HP  SSRT061181
http://www.securityfocus.com/archive/1/archive/1/446657/100/200/threaded
(UNKNOWN)  HP  SSRT061236
http://www.redhat.com/support/errata/RHSA-2006-0594.html
(UNKNOWN)  REDHAT  RHSA-2006:0594
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
(UNKNOWN)  MANDRIVA  MDKSA-2006:146
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
(UNKNOWN)  MANDRIVA  MDKSA-2006:145
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
(UNKNOWN)  MANDRIVA  MDKSA-2006:143
http://www.debian.org/security/2006/dsa-1161
(UNKNOWN)  DEBIAN  DSA-1161
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102971-1
(UNKNOWN)  SUNALERT  102971
http://secunia.com/advisories/25839
(UNKNOWN)  SECUNIA  25839
http://secunia.com/advisories/22342
(UNKNOWN)  SECUNIA  22342
http://secunia.com/advisories/22210
(UNKNOWN)  SECUNIA  22210
http://secunia.com/advisories/22066
(UNKNOWN)  SECUNIA  22066
http://secunia.com/advisories/22065
(UNKNOWN)  SECUNIA  22065
http://secunia.com/advisories/22055
(UNKNOWN)  SECUNIA  22055
http://secunia.com/advisories/21675
(UNKNOWN)  SECUNIA  21675
http://secunia.com/advisories/21631
(UNKNOWN)  SECUNIA  21631

- 漏洞信息

Mozilla Firefox/SeaMonkey/Thunderbird 多个JAVA脚本拒绝服务攻击漏洞
高危 缓冲区溢出
2006-07-27 00:00:00 2006-08-26 00:00:00
远程  
        Mozilla Firefox/SeaMonkey/Thunderbird都是Mozilla发布的WEB浏览器和邮件新闻组客户端产品。
        上述产品中存在多个安全漏洞,具体如下:
        允许远程攻击者造成拒绝服务攻击(崩溃)和可能利用JAVA脚本导致内存溢出引起任意代码执行.这些漏洞包括:(1) nsListControlFrame::FireMenuItemActiveEvent, (2)string class缓冲区溢出 (3) 列表和栏目, (4) "UA样式表的匿名选择项," (5) removed nodes," 和(6)运行加密.CRMP请求恢复删除的文本

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://lwn.net/Alerts/193397/?format=printable
        http://lwn.net/Alerts/193396/?format=printable
        http://lwn.net/Alerts/193263/?format=printable

- 漏洞信息 (F50002)

Debian Linux Security Advisory 1161-2 (PacketStormID:F50002)
2006-09-14 00:00:00
Debian  debian.org
advisory
linux,debian
CVE-2006-3805,CVE-2006-3806,CVE-2006-3807,CVE-2006-3808,CVE-2006-3809,CVE-2006-3811
[点击下载]

Debian Security Advisory 1161-2 - The latest security updates of Mozilla Firefox introduced a regression that led to a disfunctional attachment panel which warrants a correction to fix this issue.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1161-2                    security@debian.org
http://www.debian.org/security/                             Martin Schulze
September 13th, 2006                    http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : mozilla-firefox
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2006-3805 CVE-2006-3806 CVE-2006-3807 CVE-2006-3808
                 CVE-2006-3809 CVE-2006-3811
CERT advisories: VU#655892 VU#687396 VU#876420
BugTraq ID     : 19181

The latest security updates of Mozilla Firefox introduced a regression
that led to a disfunctional attachment panel which warrants a
correction to fix this issue.  For reference please find below the
original advisory text:

  Several security related problems have been discovered in Mozilla and
  derived products like Mozilla Firefox.  The Common Vulnerabilities and
  Exposures project identifies the following vulnerabilities:

  CVE-2006-3805

      The Javascript engine might allow remote attackers to execute
      arbitrary code.  [MFSA-2006-50]

  CVE-2006-3806

      Multiple integer overflows in the Javascript engine might allow
      remote attackers to execute arbitrary code.  [MFSA-2006-50]

  CVE-2006-3807

      Specially crafted Javascript allows remote attackers to execute
      arbitrary code.  [MFSA-2006-51]

  CVE-2006-3808

      Remote AutoConfig (PAC) servers could execute code with elevated
      privileges via a specially crafted PAC script.  [MFSA-2006-52]

  CVE-2006-3809

      Scripts with the UniversalBrowserRead privilege could gain
      UniversalXPConnect privileges and possibly execute code or obtain
      sensitive data.  [MFSA-2006-53]

  CVE-2006-3811

      Multiple vulnerabilities allow remote attackers to cause a denial
      of service (crash) and possibly execute arbitrary code.
      [MFSA-2006-55]

For the stable distribution (sarge) these problems have been fixed in
version 1.0.4-2sarge11.

For the unstable distribution (sid) these problems have been fixed in
version 1.5.dfsg+1.5.0.5-1.

We recommend that you upgrade your mozilla-firefox package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11.dsc
      Size/MD5 checksum:     1003 fcb7947248bc53a236134e59a7e9673a
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11.diff.gz
      Size/MD5 checksum:   419204 417893bc76c1a0f772e6c6eff7571c98
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz
      Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d

  Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_alpha.deb
      Size/MD5 checksum: 11176846 0f8f7a2dfe4758092806312b92c0fa16
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_alpha.deb
      Size/MD5 checksum:   169842 7bc6af501357d15416aa39a731ad84a7
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_alpha.deb
      Size/MD5 checksum:    61674 6746719356df15955ad4cadfee8a44ae

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_amd64.deb
      Size/MD5 checksum:  9405320 6cb1704571922ccc445aa3b54cfee6b1
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_amd64.deb
      Size/MD5 checksum:   164636 81725e9973607ef36dd732a2e7ef40a1
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_amd64.deb
      Size/MD5 checksum:    60204 2eb1e134427f4f4dc94233c42aadc295

  ARM architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_arm.deb
      Size/MD5 checksum:  8228072 fd099e40cc4ab7475f9b9ee5edbaf224
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_arm.deb
      Size/MD5 checksum:   156064 10ce619e39bc6b2731114786e1cb9c93
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_arm.deb
      Size/MD5 checksum:    55518 da686a241720a55b9f444c2d00da3fb8

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_hppa.deb
      Size/MD5 checksum: 10281878 47dd66ed0e3f65b784257a3a7124b669
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_hppa.deb
      Size/MD5 checksum:   167584 b795910270c5244dce878ede41b1bf4e
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_hppa.deb
      Size/MD5 checksum:    60656 e2735db17f1c50937886821f5c682325

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_i386.deb
      Size/MD5 checksum:  8905260 78f91ed5ea64d8401f81c881bf197318
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_i386.deb
      Size/MD5 checksum:   159842 39c39cc385ece1da80d7129ad5d91073
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_i386.deb
      Size/MD5 checksum:    57062 54ca183ad099a3d172a03433fb9bae77

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_ia64.deb
      Size/MD5 checksum: 11638550 b7c8dca5be087b63b0c9cb99a5406ee6
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_ia64.deb
      Size/MD5 checksum:   170184 ebba92837650a1af655a24b3196510cd
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_ia64.deb
      Size/MD5 checksum:    64872 0da252d7693a0c55a7f1e9e92e8bfd93

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_m68k.deb
      Size/MD5 checksum:  8180246 a55c8120cfc2da1df53dc65ecd6fce91
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_m68k.deb
      Size/MD5 checksum:   158684 746c12952165ac9375d63b5ae8ba34f1
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_m68k.deb
      Size/MD5 checksum:    56318 e1b1e85cf556c71d425403b0177aa871

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_mips.deb
      Size/MD5 checksum:  9939250 9e86d61f30f4057e59dc7f310cbb5cf5
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_mips.deb
      Size/MD5 checksum:   157634 e5f8214f60849ae5ac4be6967719d2cd
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_mips.deb
      Size/MD5 checksum:    57332 aec13be187d73ef17e173594f6476b5a

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_mipsel.deb
      Size/MD5 checksum:  9814448 412c4ae8bf5c53d0d6eb151a13f5be65
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_mipsel.deb
      Size/MD5 checksum:   157198 a7ef40abac781f64a43fb6bfd5013785
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_mipsel.deb
      Size/MD5 checksum:    57148 50378fe99784dd4e0612f2339843345a

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_powerpc.deb
      Size/MD5 checksum:  8576000 845d7e9726dfe677b3e7e788b3c4daa7
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_powerpc.deb
      Size/MD5 checksum:   158278 cee79f6031004b1d26287c1766acc8c0
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_powerpc.deb
      Size/MD5 checksum:    59444 3cede4cc2ffbb21a460a87ae6da4c443

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_s390.deb
      Size/MD5 checksum:  9644388 4cdc4fba0ff2f749509e0162eac50ab1
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_s390.deb
      Size/MD5 checksum:   165190 285d75aa1d10c558cf56de3917777ab4
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_s390.deb
      Size/MD5 checksum:    59630 686ad114f29bce70ebeef7744ac140a9

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_sparc.deb
      Size/MD5 checksum:  8667892 cac220d156fdb0d0a307ccbec6e648af
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_sparc.deb
      Size/MD5 checksum:   158460 fa572a3d6e045fd7faca38d96ad0d529
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_sparc.deb
      Size/MD5 checksum:    55882 e70bf88e151ba6e56a9bc4239bc519c8


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFB+V1W5ql+IAeqTIRAiJcAKC1xZEZWxqGwxAj9/MBcUj+paZ7ggCaAzHa
qumKTR/tQ7FOiv+RBH/RVqw=
=JKuZ
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F49555)

Debian Linux Security Advisory 1161-1 (PacketStormID:F49555)
2006-08-30 00:00:00
Debian  debian.org
advisory
linux,debian
CVE-2006-3805,CVE-2006-3806,CVE-2006-3807,CVE-2006-3808,CVE-2006-3809,CVE-2006-3811
[点击下载]

Debian Security Advisory 1161-1 - Several security related problems have been discovered in Mozilla and derived products like Mozilla Firefox.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1161-1                    security@debian.org
http://www.debian.org/security/                             Martin Schulze
August 29th, 2006                       http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : mozilla-firefox
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2006-3805 CVE-2006-3806 CVE-2006-3807 CVE-2006-3808
                 CVE-2006-3809 CVE-2006-3811
CERT advisories: VU#655892 VU#687396 VU#876420
BugTraq ID     : 19181

Several security related problems have been discovered in Mozilla and
derived products like Mozilla Firefox.  The Common Vulnerabilities and
Exposures project identifies the following vulnerabilities:

CVE-2006-3805

    The Javascript engine might allow remote attackers to execute
    arbitrary code.  [MFSA-2006-50]

CVE-2006-3806

    Multiple integer overflows in the Javascript engine might allow
    remote attackers to execute arbitrary code.  [MFSA-2006-50]

CVE-2006-3807

    Specially crafted Javascript allows remote attackers to execute
    arbitrary code.  [MFSA-2006-51]

CVE-2006-3808

    Remote AutoConfig (PAC) servers could execute code with elevated
    privileges via a specially crafted PAC script.  [MFSA-2006-52]

CVE-2006-3809

    Scripts with the UniversalBrowserRead privilege could gain
    UniversalXPConnect privileges and possibly execute code or obtain
    sensitive data.  [MFSA-2006-53]

CVE-2006-3811

    Multiple vulnerabilities allow remote attackers to cause a denial
    of service (crash) and possibly execute arbitrary code.
    [MFSA-2006-55]

For the stable distribution (sarge) these problems have been fixed in
version 1.0.4-2sarge10.

For the unstable distribution (sid) these problems have been fixed in
version 1.5.dfsg+1.5.0.5-1.

We recommend that you upgrade your mozilla-firefox package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10.dsc
      Size/MD5 checksum:     1003 09583ca7a6bd470e092c5226528ae80c
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10.diff.gz
      Size/MD5 checksum:   419119 3618884176a92d3ac97022e074188e77
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz
      Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d

  Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_alpha.deb
      Size/MD5 checksum: 11176644 0b0ab73f6c4deebad034c9c5f604d3a0
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_alpha.deb
      Size/MD5 checksum:   169796 fbfddc6581dd0c7389a6445ecb0ec3f9
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_alpha.deb
      Size/MD5 checksum:    61598 b07ab088199007de44282145a7721fc3

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_amd64.deb
      Size/MD5 checksum:  9405310 33590c4e5998a0b7fa9a26b281e7da3c
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_amd64.deb
      Size/MD5 checksum:   164566 aceef401edf65c2633f27aad978396dc
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_amd64.deb
      Size/MD5 checksum:    60122 d5250c9fb83f1b7c67123a1bf2191840

  ARM architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_arm.deb
      Size/MD5 checksum:  8228178 aed4e4dbbeefc391454e3f7aebc63a15
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_arm.deb
      Size/MD5 checksum:   156018 440374f401628e71f4f01057e0418c2c
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_arm.deb
      Size/MD5 checksum:    55444 02d92e0752b89ff7b049252b6c327300

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_i386.deb
      Size/MD5 checksum:  8904976 b2441882b3107c287ce1cf4414b7440f
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_i386.deb
      Size/MD5 checksum:   159774 18cb2b3db08016bc6c4526574f3b72de
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_i386.deb
      Size/MD5 checksum:    56992 00e9d8fc0cf7b22666627876851a365b

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_ia64.deb
      Size/MD5 checksum: 11638750 9e7e3b0aee30e3a80a0eec0515d81258
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_ia64.deb
      Size/MD5 checksum:   170104 d6dc6f919293d517ef990cb46060d115
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_ia64.deb
      Size/MD5 checksum:    64798 9532185c638659206c6627f5857698ff

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_hppa.deb
      Size/MD5 checksum: 10281754 c5ec2b8d56096c9efb0efab75dcc9171
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_hppa.deb
      Size/MD5 checksum:   167484 9e8718e775368564fc6f691e214f651c
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_hppa.deb
      Size/MD5 checksum:    60578 65426b32ec4d7f2f7fb397aadae7b173

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_m68k.deb
      Size/MD5 checksum:  8180240 2786b8b54f2748023752d1aec5899fe2
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_m68k.deb
      Size/MD5 checksum:   158648 869e3cacfa86e6cc68fcb9d98f081607
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_m68k.deb
      Size/MD5 checksum:    56246 2f14d625a593d86ef0c13c8b7f1391e5

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_mips.deb
      Size/MD5 checksum:  9939504 c18bb8875373e0e1dd707ad9a6778d87
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_mips.deb
      Size/MD5 checksum:   157580 8ebfe5494e67be102f9ef48f9af06d82
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_mips.deb
      Size/MD5 checksum:    57268 a4bd50f5614dace6e1d524372b4d3435

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_mipsel.deb
      Size/MD5 checksum:  9814412 363c45d54885eee9c6f4c6e0116a68ed
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_mipsel.deb
      Size/MD5 checksum:   157128 cb46a82ef943f94f10c0224efdb2a336
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_mipsel.deb
      Size/MD5 checksum:    57090 6971eb188d7dbdf22b032c91ae145111

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_powerpc.deb
      Size/MD5 checksum:  8576282 1c61ed7a704bed95e6186e5fc1ffb25a
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_powerpc.deb
      Size/MD5 checksum:   158190 3ab95e22b86f243140f22687feed25af
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_powerpc.deb
      Size/MD5 checksum:    59370 5cc17f0992b7425b0f8c55422683f453

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_s390.deb
      Size/MD5 checksum:  9643386 9d62f4ad6fb018b9f6dc3b1e48e11aba
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_s390.deb
      Size/MD5 checksum:   165116 ab405fffa91e4ac0ab18891dfb763d28
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_s390.deb
      Size/MD5 checksum:    59560 c7d8aec75403e3fde0e812bac573383a

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_sparc.deb
      Size/MD5 checksum:  8667678 c65257545e9562877989ca3275df27c0
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_sparc.deb
      Size/MD5 checksum:   158394 94580d49c505b103d2b60b69022af5ab
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_sparc.deb
      Size/MD5 checksum:    55812 c0f3f408ea170b5c3b2f6e4542c52b5c


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE9Ha+W5ql+IAeqTIRAvI/AJ44HxKoYBXTdYjpw1Y0mGtgWRNhcQCfQBco
ubvT6wj8d+xgCnDda4pQVqM=
=uuVl
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F48662)

Ubuntu Security Notice 327-1 (PacketStormID:F48662)
2006-07-28 00:00:00
Ubuntu  security.ubuntu.com
advisory,javascript,vulnerability
linux,ubuntu
CVE-2006-3113,CVE-2006-3677,CVE-2006-3801,CVE-2006-3802,CVE-2006-3803,CVE-2006-3805,CVE-2006-3806,CVE-2006-3807,CVE-2006-3808,CVE-2006-3809,CVE-2006-3810,CVE-2006-3811,CVE-2006-3812
[点击下载]

Ubuntu Security Notice USN-327-1 - A multitude of javascript related vulnerabilities have been patched in Firefox.

=========================================================== 
Ubuntu Security Notice USN-327-1              July 27, 2006
firefox vulnerabilities
CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802,
CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807,
CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811,
CVE-2006-3812
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  firefox                      1.5.dfsg+1.5.0.5-0ubuntu6.06

After a standard system upgrade you need to restart Firefox to effect
the necessary changes.

Please note that Firefox 1.0.8 in Ubuntu 5.10 and Ubuntu 5.04 are also
affected by these problems. Updates for these Ubuntu releases will be
delayed due to upstream dropping support for this Firefox version. We
strongly advise that you disable JavaScript to disable the attack
vectors for most vulnerabilities if you use one of these Ubuntu
versions.

Details follow:

Various flaws have been reported that allow an attacker to execute
arbitrary code with user privileges by tricking the user into opening
a malicious URL. (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801,
CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807,
CVE-2006-3809, CVE-2006-3811, CVE-2006-3812)

cross-site scripting vulnerabilities were found in the
XPCNativeWrapper() function and native DOM method handlers. A
malicious web site could exploit these to modify the contents or steal
confidential data (such as passwords) from other opened web pages.
(CVE-2006-3802, CVE-2006-3810)

A bug was found in the script handler for automatic proxy
configuration. A malicious proxy could send scripts which could
execute arbitrary code with the user's privileges. (CVE-2006-3808)

Please see 

  http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox

for technical details of these vulnerabilities.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.diff.gz
      Size/MD5:   174602 7be6f5862219ac4cf44f05733f372f2b
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.dsc
      Size/MD5:     1109 252d6acf45b009008a6bc88166e2632f
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5.orig.tar.gz
      Size/MD5: 44067762 749933c002e158576ec15782fc451e43

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb
      Size/MD5:    49190 850dd650e7f876dd539e605d9b3026c8
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb
      Size/MD5:    50078 c1fa4a40187d9c5b58bd049edb00ce54

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
      Size/MD5: 47269292 167aadc3f03b4e1b7cb9ed826e672983
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
      Size/MD5:  2796768 b54592d0bd736f6ee12a90987771bc59
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
      Size/MD5:   216136 79fa6c69ffb0dd6037e56d1ba538ff64
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
      Size/MD5:    82358 e2e026d582a7b5352cee4453cef0fe45
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
      Size/MD5:  9400544 a9d0b804a4374dc636bb79968a2bce5c
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
      Size/MD5:   218822 a09476caea7d8d73d6a2f534bd494493
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
      Size/MD5:   161876 0e0e65348dba8167b4891b173baa8f0d
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
      Size/MD5:   235746 064fc1434a315f857ee92f60fd49d772
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
      Size/MD5:   757458 bd6a5e28e05a04a5deca731ab29f70e4

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
      Size/MD5: 43837610 a7e4a535262f8a5d5cb0ace7ed785237
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
      Size/MD5:  2796700 4509dbf62e3fd2cda7168c20aa65ba4f
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
      Size/MD5:   209546 50e174c1c7290fca51f9e1ee71ebb56c
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
      Size/MD5:    74732 25ba86caeeb1a88da4493875178a3636
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
      Size/MD5:  7916536 40ebfe4330af25c2359f8b25b039ed5e
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
      Size/MD5:   218822 6066f59acbce1b4de2dc284b5801efc5
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
      Size/MD5:   146570 c1a5c5cc4371b228093d03d9ed7ad607
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
      Size/MD5:   235754 0e9a1a89f63a9869b875ee6a50547c2b
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
      Size/MD5:   669556 d537a4771b80e5c06f18b2c5d7e5d384

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
      Size/MD5: 48648192 479d29e08ff2b9cef89a6da3285c0aad
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
      Size/MD5:  2796790 60b97738bfc3b8b32914487bb4aba239
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
      Size/MD5:   212982 a396e119a32303afc024d513b997c84e
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
      Size/MD5:    77894 ef7841bb2ab8de0e0c44e59c893b1622
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
      Size/MD5:  9019132 ed3927484eea5fccf84a2840640febf3
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
      Size/MD5:   218826 a2338c3c8064a304deb752bf32a291f8
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
      Size/MD5:   159112 7d5d6100727ceb894695b219cec11e43
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
      Size/MD5:   235754 69085beb145222fea07d2d6c19158a2d
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
      Size/MD5:   768332 8dc6cc8c54185d57af14bab3bee39f9d

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
      Size/MD5: 45235424 f5a07188af5802fffbd3cfdd64b109cf
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
      Size/MD5:  2796756 cb13c7ea0e3b7af2f1e12db1f8dc38a2
    http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
      Size/MD5:   210488 17f7723b697110c8f132422bc059d447
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
      Size/MD5:    76340 c38ccb8b71b9c3783a1c9816ecd9cf5d
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
      Size/MD5:  8411310 4b3865b2df3924d094e0b18f207bf33d
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
      Size/MD5:   218814 a0e67d0d425cea2cd5835e2c2faa930f
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
      Size/MD5:   149018 73108368f0ef745188ebd1c48ea10c88
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
      Size/MD5:   235746 695a6122710fb30201daaa239ba6d48d
    http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
      Size/MD5:   681612 896721beb3cdcea12bab98223c0796c2
    

- 漏洞信息 (F48661)

Technical Cyber Security Alert 2006-208A (PacketStormID:F48661)
2006-07-28 00:00:00
US-CERT  cert.org
advisory,remote,web,arbitrary,vulnerability
CVE-2006-3801,CVE-2006-3677,CVE-2006-3113,CVE-2006-3803,CVE-2006-3805,CVE-2006-3804,CVE-2006-3806,CVE-2006-3807,CVE-2006-3811
[点击下载]

Technical Cyber Security Alert TA06-208A - The Mozilla web browser and derived products contain several vulnerabilities, the most serious of which could allow a remote attacker to execute arbitrary code on an affected system.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                        National Cyber Alert System

                 Technical Cyber Security Alert TA06-208A


Mozilla Products Contain Multiple Vulnerabilities

   Original release date: July 27, 2006
   Last revised: --
   Source: US-CERT


Systems Affected

     * Mozilla SeaMonkey
     * Mozilla Firefox
     * Mozilla Thunderbird

   Any products based on Mozilla components, specifically Gecko, may also
   be affected.


Overview

   The Mozilla web browser and derived products contain several
   vulnerabilities, the most serious of which could allow a remote
   attacker to execute arbitrary code on an affected system.


I. Description

   Several vulnerabilities have been reported in the Mozilla web browser
   and derived products. More detailed information is available in the
   individual vulnerability notes, including the following:


   VU#476724 - Mozilla products fail to properly handle frame references 

   Mozilla products fail to properly handle frame or window references.
   This may allow a remote attacker to execute arbitrary code on a
   vulnerable system.
   (CVE-2006-3801)


   VU#670060 - Mozilla fails to properly release JavaScript references 

   Mozilla products fail to properly release memory. This vulnerability
   may allow a remote attacker to execute code on a vulnerable system.
   (CVE-2006-3677)


   VU#239124 - Mozilla fails to properly handle simultaneous XPCOM events
   
   Mozilla products are vulnerable to memory corruption via simultaneous
   XPCOM events. This may allow a remote attacker to execute arbitrary
   code on a vulnerable system.
   (CVE-2006-3113)


   VU#265964 - Mozilla products contain a race condition 

   Mozilla products contain a race condition. This vulnerability may
   allow a remote attacker to execute code on a vulnerable system.
   (CVE-2006-3803)


   VU#897540 - Mozilla products VCard attachment buffer overflow 

   Mozilla products fail to properly handle malformed VCard attachments,
   allowing a buffer overflow to occur. This vulnerability may allow a
   remote attacker to execute arbitrary code on a vulnerable system.
   (CVE-2006-3804)


   VU#876420 - Mozilla fails to properly handle garbage collection 

   The Mozilla JavaScript engine fails to properly perform garbage
   collection, which may allow a remote attacker to execute arbitrary
   code on a vulnerable system.
   (CVE-2006-3805)


   VU#655892 - Mozilla JavaScript engine contains multiple integer
   overflows 

   The Mozilla JavaScript engine contains multiple integer overflows.
   This vulnerability may allow a remote attacker to execute arbitrary
   code on a vulnerable system.
   (CVE-2006-3806)


   VU#687396 - Mozilla products fail to properly validate JavaScript
   constructors 

   Mozilla products fail to properly validate references returned by
   JavaScript constructors. This vulnerability may allow a remote
   attacker to execute arbitrary code on a vulnerable system.
   (CVE-2006-3807)


   VU#527676 - Mozilla contains multiple memory corruption
   vulnerabilities 

   Mozilla products contain multiple vulnerabilities that can cause
   memory corruption. This may allow a remote attacker to execute
   arbitrary code on a vulnerable system.
   (CVE-2006-3811)


II. Impact

   A remote, unauthenticated attacker could execute arbitrary code on a
   vulnerable system. An attacker may also be able to cause the
   vulnerable application to crash.


III. Solution

Upgrade

   Upgrade to Mozilla Firefox 1.5.0.5, Mozilla Thunderbird 1.5.0.5, or
   SeaMonkey 1.0.3.

Disable JavaScript and Java

   These vulnerabilities can be mitigated by disabling JavaScript and
   Java in all affected products. Instructions for disabling Java in
   Firefox can be found in the "Securing Your Web Browser" document.


Appendix A. References

     * US-CERT Vulnerability Notes Related to July Mozilla Security
       Advisories -
       <http://www.kb.cert.org/vuls/byid?searchview&query=firefox_1505>

     * CVE-2006-3081 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801>

     * CVE-2006-3677 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677>

     * CVE-2006-3113 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113>

     * CVE-2006-3803 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803>

     * CVE-2006-3804 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804>

     * CVE-2006-3805 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805>

     * CVE-2006-3806 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806>

     * CVE-2006-3807 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807>

     * CVE-2006-3811 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811>

     * Mozilla Foundation Security Advisories -
       <http://www.mozilla.org/security/announce/>

     * Known Vulnerabilities in Mozilla Products -
       <http://www.mozilla.org/projects/security/known-vulnerabilities.html>

     * Securing Your Web Browser -
       <http://www.us-cert.gov/reading_room/securing_browser/browser_security.html#Mozilla_Firefox>


 ____________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA06-208A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@cert.org> with "TA06-208A Feedback VU#239124" in the
   subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2006 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________


Revision History

   Jul 27, 2006: Initial release


    
    

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRMkgNexOF3G+ig+rAQIFsAgAoWoMkxxhkzb+xgLVCJF7h4k4EBCgJGWa
BSOiFfL4Gs4vv4lNooDRCIOdxiBfXYL71XsIOT4aWry5852/6kyYnyAiXXYj1Uv0
SbPY2sQSZ5EaG+G9i8HDIy3fpJN4XgH3ng1uzUnJihY19IfndbXicpZE+debIUri
qt9NRD2f5FW5feKo1cBpYxtmxQAEePOa2dJHh7I7cnFGtG3MixHx4kVEyuYUutCX
5tHDsfTIdySNkIdCQ4vhk846bErB/kaHiKMQDfMglllb3GOSc07OQ0CDo2eTPVsA
9DtKkiDP1C4dh1mxco8CWlS6327+EB0KXGGoqDF2+j/rrpsW0oc8nA==
=HwuK
-----END PGP SIGNATURE-----
    

- 漏洞信息

27572
Mozilla Multiple Products nsListControlFrame::FireMenuItemActiveEvent Arbitrary Code Execution
Loss of Integrity
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-07-25 Unknow
Unknow Unknow

- 解决方案

Upgrade Firefox to 1.5.0.5, Thunderbird to 1.5.0.5, and SeaMonkey to 1.0.3, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站