Novell is now a part of Micro Focus

Security update for the Mozilla suite

Knowledgebase

(Last modified: 14JUN2007)


solutions Security update for the Mozilla suite SuSE Linux Maintenance Web (2b5bd41bb32a85566962cdcd145ebc9c)

Applies to

Package: mozilla
mozilla-calendar
mozilla-devel
mozilla-dom-inspector
mozilla-irc
mozilla-mail
mozilla-venkman
mozilla-cs
mozilla-deat
mozilla-hu
mozilla-lib64
Product(s): SUSE CORE 9 for x86
SUSE CORE 9 for Itanium Processor Family
SUSE CORE 9 for IBM POWER
SUSE CORE 9 for IBM S/390 31bit
SUSE CORE 9 for IBM zSeries 64bit
SUSE CORE 9 for AMD64 and Intel EM64T
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
Novell Linux POS 9
Open Enterprise Server
Patch: patch-11551
Release: 20070614
Obsoletes: adf5cccb9b0cfb2f9cb649652f793fdc

Indications

Everyone using Mozilla should update.

Contraindications

None.

Problem description

This update brings Mozilla Seamonkey to security update version 1.0.9.
  • MFSA 2007-17 / CVE-2007-2871: Chris Thomas demonstrated that XUL popups opened by web content could be placed outside the boundaries of the content area. This could be used to spoof or hide parts of the browser chrome such as the location bar.
  • MFSA 2007-16 / CVE-2007-2870: Mozilla contributor moz_bug_r_a4 demonstrated that the addEventListener method could be used to inject script into another site in violation of the browser's same-origin policy. This could be used to access or modify private or valuable information from that other site.
  • MFSA 2007-15 / CVE-2007-1558: Gaetan Leurent informed us of a weakness in APOP authentication that could allow an attacker to recover the first part of your mail password if the attacker could interpose a malicious mail server on your network masquerading as your legitimate mail server. With normal settings it could take several hours for the attacker to gather enough data to recover just a few characters of the password. This result was presented at the Fast Software Encryption 2007 conference.
  • MFSA 2007-14 / CVE-2007-1362: Nicolas Derouet reported two problems with cookie handling in Mozilla clients. Insufficient length checks could be use to exhaust browser memory and so to crash the browser or at least slow it done by a large degree. The second issue was that the cookie path and name values were not checked for the presence of the delimiter used for internal cookie storage, and if present this confused future interpretation of the cookie data. This is not considered to be exploitable.
  • MFSA 2007-13 / CVE-2007-2869: Marcel reported that a malicious web page could perform a denial of service attack against the form autocomplete feature that would persist from session to session until the malicious form data was deleted. Filling a text field with millions of characters and submitting the form will cause the victim's browser to hang for up to several minutes while the form data is read, and this will happen the first time autocomplete is triggered after every browser restart. No harm is done to the user's computer, but the frustration caused by the hang could prevent use of Thunderbird if users don't know how to clear the bad state.
  • MFSA 2007-12 / CVE-2007-2867 / CVE-2007-2868 As part of the Thunderbird 2.0.0.4 and 1.5.0.12 update releases Mozilla developers fixed many bugs to improve the stability of the product. Some of these crashes that showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Without further investigation we cannot rule out the possibility that for some of these an attacker might be able to prepare memory for exploitation through some means other than JavaScript, such as large images.
  • MFSA 2007-11 / CVE-2007-1562: Incorrect FTP PASV handling could be used by malicious ftp servers to do a rudimentary port scanning of for instance internal networks of the computer the browser is running on.

Solution

Please install the updates provided at the location noted below.

Installation notes

This update is provided as an RPM package that can easily be installed onto a running system by using this command:
rpm -Fvh mozilla.rpm mozilla-calendar.rpm mozilla-devel.rpm mozilla-dom-inspector.rpm mozilla-irc.rpm mozilla-mail.rpm mozilla-venkman.rpm mozilla-cs.rpm mozilla-deat.rpm mozilla-hu.rpm mozilla-lib64.rpm

links to download packages

Download Source Packages

Download the source code of the patches for maintained products.


Disclaimer

The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.

Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.

© Copyright Micro Focus or one of its affiliates