[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 284/06 - Red Hat Security Advisory: RHSA-2006:0328-01 - Critical: Firefox security update



-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 284/06 dated 18.04.06  Time: 13:25  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

Red Hat Security Advisory: RHSA-2006:0328-01 - Critical: Firefox security update

Detail
====== 

Several bugs were found in the way Firefox processes malformed javascript.
A malicious web page could modify the content of a different open web page,
possibly stealing sensitive information or conducting a cross-site
scripting attack. (CVE-2006-1731, CVE-2006-1732, CVE-2006-1741)


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Critical: Firefox security update
Advisory ID:       RHSA-2006:0328-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2006-0328.html
Issue date:        2006-04-14
Updated on:        2006-04-14
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-0749 CVE-2006-1724 CVE-2006-1727 
                   CVE-2006-1728 CVE-2006-1729 CVE-2006-1730 
                   CVE-2006-1731 CVE-2006-1732 CVE-2006-1733 
                   CVE-2006-1734 CVE-2006-1735 CVE-2006-1737 
                   CVE-2006-1738 CVE-2006-1739 CVE-2006-1740 
                   CVE-2006-1741 CVE-2006-1742 
- - ---------------------------------------------------------------------

1. Summary:

Updated firefox packages that fix several security bugs are now available.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Mozilla Firefox is an open source Web browser.

Several bugs were found in the way Firefox processes malformed javascript.
A malicious web page could modify the content of a different open web page,
possibly stealing sensitive information or conducting a cross-site
scripting attack. (CVE-2006-1731, CVE-2006-1732, CVE-2006-1741)

Several bugs were found in the way Firefox processes certain javascript
actions. A malicious web page could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-1727,
CVE-2006-1728, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1742)

Several bugs were found in the way Firefox processes malformed web pages.
A carefully crafted malicious web page could cause the execution of
arbitrary code as the user running Firefox. (CVE-2006-0749, CVE-2006-1724,
CVE-2006-1730, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739) 

A bug was found in the way Firefox displays the secure site icon. If a
browser is configured to display the non-default secure site modal warning
dialog, it may be possible to trick a user into believing they are viewing
a secure site. (CVE-2006-1740)

A bug was found in the way Firefox allows javascript mutation events on
"input" form elements. A malicious web page could be created in such a way
that when a user submits a form, an arbitrary file could be uploaded to the
attacker. (CVE-2006-1729)

Users of Firefox are advised to upgrade to these updated packages
containing Firefox version 1.0.8 which corrects these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

183537 - CVE-2006-0749 Firefox Tag Order Vulnerability
188814 - CVE-2006-1741 Cross-site JavaScript injection using event handlers
188816 - CVE-2006-1742 JavaScript garbage-collection hazard audit
188818 - CVE-2006-1737 Crashes with evidence of memory corruption (CVE-2006-1738, CVE-2006-1739)
188820 - CVE-2006-1740 Secure-site spoof (requires security warning dialog)
188822 - CVE-2006-1735 Privilege escalation via XBL.method.eval
188824 - CVE-2006-1734 Privilege escalation using a JavaScript function's cloned parent
188826 - CVE-2006-1733 Accessing XBL compilation scope via valueOf.call()
188828 - CVE-2006-1732 cross-site scripting through window.controllers
188830 - CVE-2006-0749 Mozilla Firefox Tag Order Vulnerability
188832 - CVE-2006-1731 Cross-site scripting using .valueOf.call()
188834 - CVE-2006-1724 Crashes with evidence of memory corruption (1.5.0.2)
188836 - CVE-2006-1730 CSS Letter-Spacing Heap Overflow Vulnerability
188838 - CVE-2006-1729 File stealing by changing input type
188840 - CVE-2006-1728 Privilege escalation using crypto.generateCRMFRequest
188842 - CVE-2006-1727 Privilege escalation through Print Preview

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/firefox-1.0.8-1.4.1.src.rpm
56b5c27ea2ddbd0867f8ee87eda96cd9  firefox-1.0.8-1.4.1.src.rpm

i386:
d092a0e383f0d171a515cf3c1b50a310  firefox-1.0.8-1.4.1.i386.rpm
4f66c3525cd7904e42d1477e806a583c  firefox-debuginfo-1.0.8-1.4.1.i386.rpm

ia64:
826bc0089706ec833a75c82dd4c16555  firefox-1.0.8-1.4.1.ia64.rpm
fdb7a7c2a79ddfa19a890104abca06f4  firefox-debuginfo-1.0.8-1.4.1.ia64.rpm

ppc:
8c201529a81f5b75c23adc15dca47f9e  firefox-1.0.8-1.4.1.ppc.rpm
443c4fbffe45dd4b400c4f226b3c7d42  firefox-debuginfo-1.0.8-1.4.1.ppc.rpm

s390:
577c0d3f56cca04343d77eadf5b1680f  firefox-1.0.8-1.4.1.s390.rpm
3e9ff99420d652af75538e2ea99b3ce0  firefox-debuginfo-1.0.8-1.4.1.s390.rpm

s390x:
1e31976de69cb4eef9171bbfb1fb7621  firefox-1.0.8-1.4.1.s390x.rpm
977147cba3f966482f561d93c881a8d3  firefox-debuginfo-1.0.8-1.4.1.s390x.rpm

x86_64:
2cc4c552d8942f0b7e44457069fbaa67  firefox-1.0.8-1.4.1.x86_64.rpm
db96f3e2d520ef51ed5ebbd4e99d52a6  firefox-debuginfo-1.0.8-1.4.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/firefox-1.0.8-1.4.1.src.rpm
56b5c27ea2ddbd0867f8ee87eda96cd9  firefox-1.0.8-1.4.1.src.rpm

i386:
d092a0e383f0d171a515cf3c1b50a310  firefox-1.0.8-1.4.1.i386.rpm
4f66c3525cd7904e42d1477e806a583c  firefox-debuginfo-1.0.8-1.4.1.i386.rpm

x86_64:
2cc4c552d8942f0b7e44457069fbaa67  firefox-1.0.8-1.4.1.x86_64.rpm
db96f3e2d520ef51ed5ebbd4e99d52a6  firefox-debuginfo-1.0.8-1.4.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/firefox-1.0.8-1.4.1.src.rpm
56b5c27ea2ddbd0867f8ee87eda96cd9  firefox-1.0.8-1.4.1.src.rpm

i386:
d092a0e383f0d171a515cf3c1b50a310  firefox-1.0.8-1.4.1.i386.rpm
4f66c3525cd7904e42d1477e806a583c  firefox-debuginfo-1.0.8-1.4.1.i386.rpm

ia64:
826bc0089706ec833a75c82dd4c16555  firefox-1.0.8-1.4.1.ia64.rpm
fdb7a7c2a79ddfa19a890104abca06f4  firefox-debuginfo-1.0.8-1.4.1.ia64.rpm

x86_64:
2cc4c552d8942f0b7e44457069fbaa67  firefox-1.0.8-1.4.1.x86_64.rpm
db96f3e2d520ef51ed5ebbd4e99d52a6  firefox-debuginfo-1.0.8-1.4.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/firefox-1.0.8-1.4.1.src.rpm
56b5c27ea2ddbd0867f8ee87eda96cd9  firefox-1.0.8-1.4.1.src.rpm

i386:
d092a0e383f0d171a515cf3c1b50a310  firefox-1.0.8-1.4.1.i386.rpm
4f66c3525cd7904e42d1477e806a583c  firefox-debuginfo-1.0.8-1.4.1.i386.rpm

ia64:
826bc0089706ec833a75c82dd4c16555  firefox-1.0.8-1.4.1.ia64.rpm
fdb7a7c2a79ddfa19a890104abca06f4  firefox-debuginfo-1.0.8-1.4.1.ia64.rpm

x86_64:
2cc4c552d8942f0b7e44457069fbaa67  firefox-1.0.8-1.4.1.x86_64.rpm
db96f3e2d520ef51ed5ebbd4e99d52a6  firefox-debuginfo-1.0.8-1.4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1724
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742
http://www.mozilla.com/firefox/releases/1.0.8.html
http://www.redhat.com/security/updates/classification/#critical

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFEP8rlXlSAg2UNWIIRAtgXAJ0YJM3htFesCERmo9wsi5XIBpXRygCgwUBo
kD88jTIFZ10EdQ30AxWaqbE=
=wZAu
- -----END PGP SIGNATURE-----




- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 870 487 0748 Ext 4511
Fax: +44 (0) 870 487 0749

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 870 487 0748 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Red Hat for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the site of the
original source to ensure that you receive the most current information concerning 
that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQCVAwUBRETaKYpao72zK539AQGCwgP/VgutCXtNOQAZANacCIi41Jid3++hCXk/
Kil2W6emvmloZHzzICXseiINOfvmUvZ6RHuPF75CjsrS4RKXmRYMhbDS1PBHwL1s
wWBLTtAEo855/c0hv4Q4ZUCuEOYMEi9zkpt2q9RIdi6kq5Xzwn8MUBRWu67+qAYI
f3Ty81g76Ls=
=ndpj
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________