Category
Security
Release Phase
Resolved
ProductMozilla v1.7
Solaris 9 Operating System
Solaris 10 Operating System
Solaris 8 Operating System
Bug Id
6447023
Date of Resolved Release11-OCT-2007
Impact
A number of memory corruption vulnerabilities have been found in the Mozilla application which may allow a remote user who is able to create a web page which is visited by a local user using the Mozilla browser, or who sends a specially crafted email that is read by a local user using Mozilla, to either cause the Mozilla application to crash or execute arbitrary code with the privileges of the user running Mozilla.
The ability of a remote user to cause the Mozilla application to crash is a type of Denial of Service (DoS).
The following Mozilla advisory describes ten separate memory corruption issues:
This Sun Alert corresponds to four of the issues described in the Mozilla advisory above:
Memory corruption involving BoxObjects (Neil Rashbrook):
Memory corruption involving BoxObjects (Boris Zbarsky):
Potential integer overflow in jsstr tagify (Georgi Guninski):
Content-implemented tree views can corrupt memory (Boris Zbarsky):
Additional references:
CVE-2006-2779 describes nine of the ten issues documented in Mozilla advisory MFSA 2006-32 which includes the above issues 329219, 326931, and 326501.
CVE-2006-2780 describes the tenth issue documented in Mozilla advisory MFSA 2006-32, the integer overflow in the jsstr tagify, 335535.
CERT VU#466673 references all ten issues described in Mozilla advisory MFSA 2006-32.
Contributing Factors
This issue can occur in the following releases:
SPARC Platform
- Mozilla 1.7 (for Solaris 8 and 9) without patch 120671-06
- Mozilla 1.7 (for Solaris 10) without patch 119115-28
x86 Platform
- Mozilla 1.7 (for Solaris 8 and 9) without patch 120672-06
- Mozilla 1.7 (for Solaris 10) without patch 119116-28
Note: Mozilla 1.4 may be vulnerable to one or more of these security issues. Customers are advised to upgrade to Mozilla 1.7 to get these security fixes.
To determine the version of Mozilla on a Solaris system, the following command can be run:
% /usr/sfw/bin/mozilla -version
Mozilla 1.7, (Sun Java Desktop System), build 2005031721
Symptoms
The Mozilla browser may exit unexpectedly if these issues were exploited to cause a Denial of Service. There are no predictable symptoms that would indicate the described issues have been exploited to execute arbitrary code.
Workaround
To work around the issues described in this Sun Alert, disable JavaScript by doing the following:
- Open the "Preferences" dialog from the Edit menu
- Select the "Advanced" tree
- Select the "Scripts & Plug-ins" leaf
- Uncheck the "Navigator and Mail & Newsgroups" check boxes
- Click the OK button
Resolution
This issue is addressed in the following releases:
SPARC Platform
- Mozilla 1.7 (for Solaris 8 and 9) with patch 120671-06 or later
- Mozilla 1.7 (for Solaris 10) with patch 119115-28 or later
x86 Platform
- Mozilla 1.7 (for Solaris 8 and 9) with patch 120672-06 or later
- Mozilla 1.7 (for Solaris 10) with patch 119116-28 or later
References
119115-28
119116-28
120671-06
120672-06
AttachmentsThis solution has no attachment