Oval Definition:oval:com.redhat.rhsa:def:20040486
Revision Date:2004-09-30Version:502
Title:RHSA-2004:486: mozilla security update (Critical)
Description:Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor.

Jesse Ruderman discovered a cross-domain scripting bug in Mozilla. If a user is tricked into dragging a javascript link into another frame or page, it becomes possible for an attacker to steal or modify sensitive information from that site. Additionally, if a user is tricked into dragging two links in sequence to another window (not frame), it is possible for the attacker to execute arbitrary commands. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0905 to this issue.

Gael Delalleau discovered an integer overflow which affects the BMP handling code inside Mozilla. An attacker could create a carefully crafted BMP file in such a way that it would cause Mozilla to crash or execute arbitrary code when the image is viewed. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0904 to this issue.

Georgi Guninski discovered a stack-based buffer overflow in the vCard display routines. An attacker could create a carefully crafted vCard file in such a way that it would cause Mozilla to crash or execute arbitrary code when viewed. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0903 to this issue.

Wladimir Palant discovered a flaw in the way javascript interacts with the clipboard. It is possible that an attacker could use malicious javascript code to steal sensitive data which has been copied into the clipboard. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0908 to this issue.

Georgi Guninski discovered a heap based buffer overflow in the "Send Page" feature. It is possible that an attacker could construct a link in such a way that a user attempting to forward it could result in a crash or arbitrary code execution. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0902 to this issue.

Users of Mozilla should update to these updated packages, which contain backported patches and are not vulnerable to these issues.
Family:unixClass:patch
Status:Reference(s):CVE-2004-0902
CVE-2004-0903
CVE-2004-0904
CVE-2004-0905
CVE-2004-0908
RHSA-2004:486-01
Platform(s):Red Hat Enterprise Linux 3
Product(s):
Definition Synopsis
  • Red Hat Enterprise Linux 3 is installed
  • AND Package Information
  • mozilla-js-debugger is earlier than 37:1.4.3-3.0.4
  • AND mozilla-js-debugger is signed with Red Hat master key
  • OR
  • mozilla-mail is earlier than 37:1.4.3-3.0.4
  • AND mozilla-mail is signed with Red Hat master key
  • OR
  • mozilla-chat is earlier than 37:1.4.3-3.0.4
  • AND mozilla-chat is signed with Red Hat master key
  • OR
  • mozilla-nss-devel is earlier than 37:1.4.3-3.0.4
  • AND mozilla-nss-devel is signed with Red Hat master key
  • OR
  • mozilla is earlier than 37:1.4.3-3.0.4
  • AND mozilla is signed with Red Hat master key
  • OR
  • mozilla-dom-inspector is earlier than 37:1.4.3-3.0.4
  • AND mozilla-dom-inspector is signed with Red Hat master key
  • OR
  • mozilla-nspr-devel is earlier than 37:1.4.3-3.0.4
  • AND mozilla-nspr-devel is signed with Red Hat master key
  • OR
  • mozilla-nspr is earlier than 37:1.4.3-3.0.4
  • AND mozilla-nspr is signed with Red Hat master key
  • OR
  • mozilla-devel is earlier than 37:1.4.3-3.0.4
  • AND mozilla-devel is signed with Red Hat master key
  • OR
  • mozilla-nss is earlier than 37:1.4.3-3.0.4
  • AND mozilla-nss is signed with Red Hat master key
  • BACK