USN-468-1: Firefox vulnerabilities
1 June 2007
Firefox vulnerabilities
Releases
Details
Various flaws were discovered in the layout and JavaScript engines.
By tricking a user into opening a malicious web page, an attacker could
execute arbitrary code with the user's privileges. (CVE-2007-2867,
CVE-2007-2868)
A flaw was discovered in the form autocomplete feature. By tricking
a user into opening a malicious web page, an attacker could cause a
persistent denial of service. (CVE-2007-2869)
Nicolas Derouet discovered flaws in cookie handling. By tricking a user
into opening a malicious web page, an attacker could force the browser to
consume large quantities of disk or memory while processing long cookie
paths. (CVE-2007-1362)
A flaw was discovered in the same-origin policy handling of the
addEventListener JavaScript method. A malicious web site could exploit
this to modify the contents, or steal confidential data (such as
passwords), of other web pages. (CVE-2007-2870)
Chris Thomas discovered a flaw in XUL popups. A malicious web site
could exploit this to spoof or obscure portions of the browser UI,
such as the location bar. (CVE-2007-2871)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 7.04
-
firefox
-
2.0.0.4+1-0ubuntu1
Ubuntu 6.10
-
firefox
-
2.0.0.4+0dfsg-0ubuntu0.6.10
Ubuntu 6.06
-
firefox
-
1.5.dfsg+1.5.0.12-0ubuntu0.6.06.1
After a standard system upgrade you need to restart Firefox to effect
the necessary changes.
Related notices
- USN-469-1: mozilla-thunderbird