Note: This is an archival copy of Security Sun Alert 200587 as previously published on http://sunsolve.sun.com.
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1000449.1.
Article ID : 1000449.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2007-10-21
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

Multiple Memory Corruption Vulnerabilities in Layout Engine for Mozilla 1.7



Category
Security

Release Phase
Workaround

Product
Mozilla v1.7

Bug Id
6499440

Date of Workaround Release
22-OCT-2007

Impact

The Layout Engine in the Mozilla 1.7 application (see mozilla(1)) contains multiple memory corruption vulnerabilities which may allow a remote user who is able to create a web page which is visited by a local user using the Mozilla browser, or who sends a specially crafted email that is read by a local user using Mozilla, to either cause the Mozilla application to crash or execute arbitrary code with the privileges of the user running Mozilla. The ability of a remote user to cause the Mozilla application to crash is a type of Denial of Service (DoS).

The following Mozilla advisory describes four separate memory corruption issues:

http://www.mozilla.org/security/announce/2006/mfsa2006-65.html

This Sun Alert corresponds to two of the issues described in the Mozilla advisory above:

https://bugzilla.mozilla.org/show_bug.cgi?id=307809

https://bugzilla.mozilla.org/show_bug.cgi?id=351328

Also note that Mozilla 1.7 is not affected by the following two vulnerabilities mentioned in the advisory:

https://bugzilla.mozilla.org/show_bug.cgi?id=310267

https://bugzilla.mozilla.org/show_bug.cgi?id=350370

Additional references that describe these issues can be found in the following documents:

CVE-2006-5464 at http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-5464

CERT VU#495288 at http://www.kb.cert.org/vuls/id/495288

CERT Security Alert TA06-312A at http://www.us-cert.gov/cas/techalerts/TA06-312A.html


Contributing Factors

These issues can occur in the following releases:

SPARC Platform

  • Mozilla 1.7 (for Solaris 8, 9 and 10)

x86 Platform

  • Mozilla 1.7 (for Solaris 8, 9 and 10)

Note: Mozilla 1.4 may be vulnerable to one or more of these security issues. Customers are advised to upgrade to Mozilla 1.7 to get the security fixes once they are available.

To determine the version of Mozilla on a Solaris system, the following command can be run:

    % /usr/sfw/bin/mozilla -version
    Mozilla 1.7, (Sun Java Desktop System), build 2005031721

Symptoms

There are no predictable symptoms that would indicate the described issues have been exploited.


Workaround

These vulnerabilities may be avoided by disabling Javascript:

  1. Open the "Preferences" dialog from the Edit menu
  2. Select the "Advanced" tree
  3. Select the "Scripts & Plug-ins" leaf
  4. Uncheck the "Navigator and Mail & Newsgroups" check boxes
  5. Click the OK button. 

Resolution

A final resolution is pending completion.












Attachments
This solution has no attachment