The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Secunia Research: Mozilla Firefox XPCOM Event Handling Memory


<< Previous INDEX Search src / Print Next >>
Subject: Secunia Research: Mozilla Firefox XPCOM Event Handling Memory
        Corruption
From: Secunia Research <remove-vuln@secunia.com.>
Reply-To: [email protected]
To: [email protected]
Cc: [email protected]
Content-Type: text/plain
Organization: Secunia
Date: Thu, 27 Jul 2006 13:44:20 +0200
Message-Id: <1154000660.5011.449.camel@ts2.intnet.>
Mime-Version: 1.0
X-Mailer: Evolution 2.0.2 (2.0.2-27) 
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: antivirus-gw at tyumen.ru



Secunia Research 27/07/2006 - Mozilla Firefox XPCOM Event Handling Memory Corruption -
Table of Contents Affected Software....................................................1 Severity.............................................................2 Vendor's Description of Software.....................................3 Description of Vulnerability.........................................4 Solution.............................................................5 Time Table...........................................................6 Credits..............................................................7 References...........................................................8 About Secunia........................................................9 Verification........................................................10
1) Affected Software Mozilla Firefox 1.5.0.1, 1.5.0.2, 1.5.0.3, and 1.5.0.4. NOTE: Other versions may also be affected.
2) Severity Rating: Highly critical Impact: System access Where: Remote
3) Vendor's Description of Software "The award-winning, free Web browser is better than ever. Browse the Web with confidence - Firefox protects you from viruses, spyware and pop-ups. Enjoy improvements to performance, ease of use and privacy. It's easy to import your favorites and settings and get started." Product Link: http://www.mozilla.com/firefox/
4) Description of Vulnerability Secunia Research has discovered a vulnerability in Mozilla Firefox, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events resulting in the use of a deleted timer object. Successful exploitation allows execution of arbitrary code.
5) Solution Update to version 1.5.0.5.
6) Time Table 22/06/2006 - Vendor notified. 23/06/2006 - Vendor response. 27/07/2006 - Public disclosure.
7) Credits Discovered by Carsten Eiram, Secunia Research.
8) References Mozilla.org: http://www.mozilla.org/security/announce/2006/mfsa2006-46.html The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2006-3113 for the vulnerability.
9) About Secunia Secunia collects, validates, assesses, and writes advisories regarding all the latest software vulnerabilities disclosed to the public. These advisories are gathered in a publicly available database at the Secunia website: http://secunia.com/ Secunia offers services to our customers enabling them to receive all relevant vulnerability information to their specific system configuration. Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/secunia_security_advisories/
10) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2006-53/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру