Note: This is an archival copy of Security Sun Alert 201532 as previously published on
Latest version of this security advisory is available from as Sun Alert 1001142.1.
Article ID : 1001142.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2007-10-29
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

Multiple Security Vulnerabilities in the Layout Engine in Mozilla 1.7 for Solaris 8, 9 and 10


Release Phase

Mozilla v1.7
Solaris 9 Operating System
Solaris 10 Operating System
Solaris 8 Operating System

Bug Id

Date of Workaround Release


The Layout Engine in the Mozilla 1.7 application (see mozilla(1)) contains multiple memory corruption vulnerabilities which may allow a remote user who is able to create a web page which is visited by a local user using the Mozilla browser, or who sends a specially crafted email that is read by a local user using Mozilla, to either cause the Mozilla application to crash or execute arbitrary code with the privileges of the user running Mozilla. The ability of a remote user to cause the Mozilla application to crash is a type of Denial of Service (DoS).

The following Mozilla advisory describes 30 separate issues. Of these issues, 20 affect the Layout engine and are listed under CVE-2007-2867, and 10 affect the JavaScript engine and are listed under CVE-2007-2868:

This Sun Alert corresponds to the 20 Layout engine issues described in the Mozilla advisory under CVE-2007-2867.

Additional references:

Contributing Factors

These issues can occur in the following releases:

SPARC Platform

  • Mozilla 1.7 (for Solaris 8)
  • Mozilla 1.7 (for Solaris 9)
  • Mozilla 1.7 (for Solaris 10)

x86 Platform

  • Mozilla 1.7 (for Solaris 8)
  • Mozilla 1.7 (for Solaris 9)
  • Mozilla 1.7 (for Solaris 10)

Note: Mozilla 1.4 may be vulnerable to one or more of these security issues. Customers are advised to upgrade to Mozilla 1.7 to get the security fixes once they are available.

To determine the version of Mozilla on a Solaris system, the following command can be run:

    % /usr/sfw/bin/mozilla -version
    Mozilla 1.7, (Sun Java Desktop System), build 2005031721



There are no predictable symptoms that would indicate the described issues have been exploited.


To work around the issues described in this Sun Alert, disable JavaScript by doing the following:

  1. Open the "Preferences" dialog from the Edit menu
  2. Select the "Advanced" tree
  3. Select the "Scripts & Plug-ins" leaf
  4. Uncheck the "Navigator" and "Mail & Newsgroups" check boxes
  5. Click the "OK" button


A final resolution is pending completion.

This solution has no attachment