The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Mozilla Firefox Tag Parsing Code Execution Vulnerability


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 27 Apr 2006 14:01:38 +0200
Subject: [NEWS] Mozilla Firefox Tag Parsing Code Execution Vulnerability
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060427132433.E25A957AF@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Mozilla Firefox Tag Parsing Code Execution Vulnerability
------------------------------------------------------------------------


SUMMARY

 <http://www.mozilla.com/firefox/>; Mozilla Firefox is "a free, open 
source, cross-platform, graphical web browser developed by the Mozilla 
Corporation and hundreds of volunteers".

This vulnerability allows attackers to execute arbitrary code on 
vulnerable installations of the Mozilla/Firefox web browser and 
Thunderbird e-mail client. User interaction is required to exploit this 
vulnerability in that the target must visit a malicious page or open a 
malicious e-mail.

DETAILS

Vulnerable Systems:
 * Firefox versions 1.0 - 1.0.7
 * Thunderbird versions 1.5 - 1.5.0.1
 * Thunderbird versions 1.0 - 1.0.7
 * SeaMonkey version 1.0
 * Mozilla Suite versions 1.7 - 1.7.12

The specific flaw exists within nsHTMLContentSink.cpp, during the parsing 
of HTML tags as they appear in a specific order. The flaw results in a 
memory corruption that leads to an attacker controlled function pointer 
dereference from the stack and eventually execution of arbitrary code.

Vendor Response:
Mozilla has issued an update to correct this vulnerability. Further 
details are available at:
 <http://www.mozilla.org/security/announce/2006/mfsa2006-18.html>; 
http://www.mozilla.org/security/announce/2006/mfsa2006-18.html

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749>; 
CVE-2006-0749

Disclosure Timeline:
2005.12.13 - Vulnerability reported to vendor
2005.12.13 - Digital Vaccine released to TippingPoint customers
2006.04.14 - Coordinated public release of advisory


ADDITIONAL INFORMATION

The information has been provided by ZDI.
The original article can be found at:  
<http://www.zerodayinitiative.com/advisories/ZDI-06-009.html>; 
http://www.zerodayinitiative.com/advisories/ZDI-06-009.html




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру