Debian: New Mozilla Firefox packages fix several vulnerabilities

    Date01 Sep 2005
    CategoryDebian
    7127
    Posted ByLinuxSecurity Advisories
    Update Package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 779-2                     This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                             Martin Schulze
    September 1st, 2005                     http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : mozilla-firefox
    Vulnerability  : several
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CAN-2005-2260 CAN-2005-2261 CAN-2005-2262 CAN-2005-2263
                     CAN-2005-2264 CAN-2005-2265 CAN-2005-2266 CAN-2005-2267
                     CAN-2005-2268 CAN-2005-2269 CAN-2005-2270 
    BugTraq ID     : 14242
    Debian Bug     : 318061
    
    We experienced that the update for Mozilla Firefox from DSA 779-1
    unfortunately was a regression in several cases.  Since the usual
    praxis of backporting apparently does not work, this update is
    basically version 1.0.6 with the version number rolled back, and hence
    still named 1.0.4-*.  For completeness below is the original advisory
    text:
    
      Several problems have been discovered in Mozilla Firefox, a
      lightweight web browser based on Mozilla.  The Common Vulnerabilities
      and Exposures project identifies the following problems:
    
      CAN-2005-2260
    
          The browser user interface does not properly distinguish between
          user-generated events and untrusted synthetic events, which makes
          it easier for remote attackers to perform dangerous actions that
          normally could only be performed manually by the user.
    
      CAN-2005-2261
    
          XML scripts ran even when Javascript disabled.
    
      CAN-2005-2262
    
          The user can be tricked to executing arbitrary JavaScript code by
          using a JavaScript URL as wallpaper.
    
      CAN-2005-2263
    
          It is possible for a remote attacker to execute a callback
          function in the context of another domain (i.e. frame).
    
      CAN-2005-2264
    
          By opening a malicious link in the sidebar it is possible for
          remote attackers to steal sensitive information.
    
      CAN-2005-2265
    
          Missing input sanitising of InstallVersion.compareTo() can cause
          the application to crash.
    
      CAN-2005-2266
    
          Remote attackers could steal sensitive information such as cookies
          and passwords from web sites by accessing data in alien frames.
    
      CAN-2005-2267
    
          By using standalone applications such as Flash and QuickTime to
          open a javascript: URL, it is possible for a remote attacker to
          steal sensitive information and possibly execute arbitrary code.
    
      CAN-2005-2268
    
          It is possible for a Javascript dialog box to spoof a dialog box
          from a trusted site and facilitates phishing attacks.
    
      CAN-2005-2269
    
          Remote attackers could modify certain tag properties of DOM nodes
          that could lead to the execution of arbitrary script or code.
    
      CAN-2005-2270
    
          The Mozilla browser familie does not properly clone base objects,
          which allows remote attackers to execute arbitrary code.
    
    The old stable distribution (woody) is not affected by these problems.
    
    For the stable distribution (sarge) these problems have been fixed in
    version 1.0.4-2sarge3.
    
    For the unstable distribution (sid) these problems have been fixed in
    version 1.0.6-1.
    
    We recommend that you upgrade your Mozilla Firefox packages.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3.dsc
          Size/MD5 checksum:     1001 e9e343d5899bc10b64650464839db1dc
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3.diff.gz
          Size/MD5 checksum:   323682 3e07c7d42de155ed01210386bc2f06f7
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz
          Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_alpha.deb
          Size/MD5 checksum: 11162870 103e4b84e9d2052cb4260b96e41319aa
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_alpha.deb
          Size/MD5 checksum:   166886 906bfa51b6c0cb8966fe06aec2b5816e
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_alpha.deb
          Size/MD5 checksum:    58708 1b3025f62bb3cb67b32c73c9f20ac5ba
    
      AMD64 architecture:
    
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_amd64.deb
          Size/MD5 checksum:  9397790 6b14119f896013d55826cb59dac50c3b
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_amd64.deb
          Size/MD5 checksum:   161636 33635aa0e4e18a2f8868bb49969a37a6
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_amd64.deb
          Size/MD5 checksum:    57194 a46c10258c9929c8e9f8001838dc4fe4
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_arm.deb
          Size/MD5 checksum:  8216696 f39cae6e1e57a572c316c14cc6c0b3d6
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_arm.deb
          Size/MD5 checksum:   153076 c634b6a8d6f42008526607877071bcaa
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_arm.deb
          Size/MD5 checksum:    52548 04b5b1e840e77b56837e1991c11a9ff6
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_i386.deb
          Size/MD5 checksum:  8889628 c7730b4e3df2f6a0bb12186a52884a9e
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_i386.deb
          Size/MD5 checksum:   156844 806fd550f9a5283e4fab73443c73fbcd
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_i386.deb
          Size/MD5 checksum:    54096 9eb9d71896406a619bd186bfe10ed0f2
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_ia64.deb
          Size/MD5 checksum: 11617476 564858f6b1f36f84a1fa9e8c7cb71316
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_ia64.deb
          Size/MD5 checksum:   167224 b574fe291d5537628022434ef13c9587
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_ia64.deb
          Size/MD5 checksum:    61876 4625f067b0cdb1a0de04829a9edbc6d7
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_hppa.deb
          Size/MD5 checksum: 10266194 05ebaf745a3854b8a4dc8dd0e1cff53c
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_hppa.deb
          Size/MD5 checksum:   164592 902df65efa25b497b99a62d1a38acc2e
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_hppa.deb
          Size/MD5 checksum:    57692 2221b941de975d360a6f2123d83a73ea
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_m68k.deb
          Size/MD5 checksum:  8167252 23f5666813a7118b5a1e841337b2b9aa
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_m68k.deb
          Size/MD5 checksum:   155742 f46394239362846cfdbe2f2d316bbc18
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_m68k.deb
          Size/MD5 checksum:    53352 619ac605ca4c6d0b449f6b2652b76463
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_mips.deb
          Size/MD5 checksum:  9919620 0f246fc3335b23e9975d78b0f86a2682
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_mips.deb
          Size/MD5 checksum:   154596 90a7786ea46368235be9b052b07eb7d0
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_mips.deb
          Size/MD5 checksum:    54366 ccec0a41faf2945c6ec426311fe4bf77
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_mipsel.deb
          Size/MD5 checksum:  9803502 117b7e5ea7a0d7b78518218009024eaa
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_mipsel.deb
          Size/MD5 checksum:   154172 a090df008b2336d500d772cf538dbe3e
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_mipsel.deb
          Size/MD5 checksum:    54180 1dde88657a7740f8261f8804a5bc3a13
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_powerpc.deb
          Size/MD5 checksum:  8561832 f6dd2ad6a53d96b8779fcecd022733ae
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_powerpc.deb
          Size/MD5 checksum:   155236 88e76f256f6aa39c93ca73b95141e6fc
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_powerpc.deb
          Size/MD5 checksum:    56482 1525d1b14855694f62110a8fd2ad4b61
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_s390.deb
          Size/MD5 checksum:  9635736 770eca99436ee1646cc9af8eb1f4bce4
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_s390.deb
          Size/MD5 checksum:   162228 c17de607a44ebdd3838d07a8d784f9b8
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_s390.deb
          Size/MD5 checksum:    56664 ead0e97932f0bc9ad8c756d46cf6540f
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge3_sparc.deb
          Size/MD5 checksum:  8651242 7b87e6d2fca175b70259035c0d5506cf
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge3_sparc.deb
          Size/MD5 checksum:   155458 2ae1ce848a6ea81a485f2f1240f894cc
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge3_sparc.deb
          Size/MD5 checksum:    52906 89b1bb81288c9fa1f156ba6354292484
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"6","type":"x","order":"2","pct":60,"resources":[]},{"id":"86","title":"No","votes":"4","type":"x","order":"3","pct":40,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.