Oval Definition:oval:com.redhat.rhsa:def:20050386
Revision Date:2005-04-26Version:502
Title:RHSA-2005:386: Mozilla security update (Important)
Description:Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor.

Vladimir V. Perepelitsa discovered a bug in the way Mozilla handles anonymous functions during regular expression string replacement. It is possible for a malicious web page to capture a random block of browser memory. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0989 to this issue.

Doron Rosenberg discovered a bug in the way Mozilla displays pop-up windows. If a user choses to open a pop-up window whose URL is malicious javascript, the script will be executed with elevated privileges. (CAN-2005-1153)

A bug was found in the way Mozilla handles the javascript global scope for a window. It is possible for a malicious web page to define a global variable known to be used by a different site, allowing malicious code to be executed in the context of the site. (CAN-2005-1154)

Michael Krax discovered a bug in the way Mozilla handles favicon links. A malicious web page can programatically define a favicon link tag as javascript, executing arbitrary javascript with elevated privileges. (CAN-2005-1155)

Michael Krax discovered a bug in the way Mozilla installed search plugins. If a user chooses to install a search plugin from a malicious site, the new plugin could silently overwrite an existing plugin. This could allow the malicious plugin to execute arbitrary code and stealm sensitive information. (CAN-2005-1156 CAN-2005-1157)

A bug was found in the way Mozilla validated several XPInstall related javascript objects. A malicious web page could pass other objects to the XPInstall objects, resulting in the javascript interpreter jumping to arbitrary locations in memory. (CAN-2005-1159)

A bug was found in the way the Mozilla privileged UI code handled DOM nodes from the content window. A malicious web page could install malicious javascript code or steal data requiring a user to do commonplace actions such as clicking a link or opening the context menu. (CAN-2005-1160)

Users of Mozilla are advised to upgrade to this updated package which contains Mozilla version 1.7.7 to correct these issues.
Family:unixClass:patch
Status:Reference(s):CVE-2005-0989
CVE-2005-1153
CVE-2005-1154
CVE-2005-1155
CVE-2005-1156
CVE-2005-1157
CVE-2005-1159
CVE-2005-1160
RHSA-2005:386-01
Platform(s):Red Hat Enterprise Linux 4
Product(s):
Definition Synopsis
  • Red Hat Enterprise Linux 4 is installed
  • AND Package Information
  • mozilla-js-debugger is earlier than 37:1.7.7-1.4.2
  • AND mozilla-js-debugger is signed with Red Hat master key
  • OR
  • mozilla-mail is earlier than 37:1.7.7-1.4.2
  • AND mozilla-mail is signed with Red Hat master key
  • OR
  • mozilla-chat is earlier than 37:1.7.7-1.4.2
  • AND mozilla-chat is signed with Red Hat master key
  • OR
  • mozilla-nss-devel is earlier than 37:1.7.7-1.4.2
  • AND mozilla-nss-devel is signed with Red Hat master key
  • OR
  • mozilla is earlier than 37:1.7.7-1.4.2
  • AND mozilla is signed with Red Hat master key
  • OR
  • mozilla-dom-inspector is earlier than 37:1.7.7-1.4.2
  • AND mozilla-dom-inspector is signed with Red Hat master key
  • OR
  • mozilla-nspr-devel is earlier than 37:1.7.7-1.4.2
  • AND mozilla-nspr-devel is signed with Red Hat master key
  • OR
  • mozilla-nspr is earlier than 37:1.7.7-1.4.2
  • AND mozilla-nspr is signed with Red Hat master key
  • OR
  • mozilla-devel is earlier than 37:1.7.7-1.4.2
  • AND mozilla-devel is signed with Red Hat master key
  • OR
  • mozilla-nss is earlier than 37:1.7.7-1.4.2
  • AND mozilla-nss is signed with Red Hat master key
  • OR
  • devhelp is earlier than 0:0.9.2-2.4.4
  • AND devhelp is signed with Red Hat master key
  • OR
  • devhelp-devel is earlier than 0:0.9.2-2.4.4
  • AND devhelp-devel is signed with Red Hat master key
  • BACK