User: Password:
|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2006:0610-01 (firefox)

From:  bugzilla@redhat.com
To:  enterprise-watch-list@redhat.com
Subject:  [RHSA-2006:0610-01] Critical: firefox security update
Date:  Fri, 28 Jul 2006 20:16:50 -0400

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2006:0610-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0610.html Issue date: 2006-07-28 Updated on: 2006-07-28 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-2779 CVE-2006-2780 CVE-2006-2783 CVE-2006-2782 CVE-2006-2778 CVE-2006-2776 CVE-2006-2784 CVE-2006-2785 CVE-2006-2786 CVE-2006-2787 CVE-2006-2788 CVE-2006-3801 CVE-2006-3677 CVE-2006-3113 CVE-2006-3802 CVE-2006-3803 CVE-2006-3805 CVE-2006-3806 CVE-2006-3807 CVE-2006-3808 CVE-2006-3809 CVE-2006-3810 CVE-2006-3811 CVE-2006-3812 - --------------------------------------------------------------------- 1. Summary: Updated firefox packages that fix several security bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Mozilla Firefox is an open source Web browser. The Mozilla Foundation has discontinued support for the Mozilla Firefox 1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox 1.5 branch. This update also resolves a number of outstanding Firefox security issues: Several flaws were found in the way Firefox processed certain javascript actions. A malicious web page could execute arbitrary javascript instructions with the permissions of "chrome", allowing the page to steal sensitive information or install browser malware. (CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809, CVE-2006-3812) Several denial of service flaws were found in the way Firefox processed certain web content. A malicious web page could crash the browser or possibly execute arbitrary code as the user running Firefox. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811) A cross-site scripting flaw was found in the way Firefox processed Unicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web page could execute a script within the browser that a web input sanitizer could miss due to a malformed "script" tag. (CVE-2006-2783) Several flaws were found in the way Firefox processed certain javascript actions. A malicious web page could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810) A form file upload flaw was found in the way Firefox handled javascript input object mutation. A malicious web page could upload an arbitrary local file at form submission time without user interaction. (CVE-2006-2782) A denial of service flaw was found in the way Firefox called the crypto.signText() javascript function. A malicious web page could crash the browser if the victim had a client certificate loaded. (CVE-2006-2778) Two HTTP response smuggling flaws were found in the way Firefox processed certain invalid HTTP response headers. A malicious web site could return specially crafted HTTP response headers which may bypass HTTP proxy restrictions. (CVE-2006-2786) A flaw was found in the way Firefox processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary javascript instructions with the permissions of "chrome", allowing the page to steal sensitive information or install browser malware. (CVE-2006-3808) A double free flaw was found in the way the nsIX509::getRawDER method was called. If a victim visited a carefully crafted web page, it was possible to execute arbitrary code as the user running Firefox. (CVE-2006-2788) Users of Firefox are advised to upgrade to this update, which contains Firefox version 1.5.0.5 that corrects these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 193895 - CVE-2006-2779 multiple firefox DoS issues (CVE-2006-2780) 196973 - CVE-2006-2783 multiple Firefox issues (CVE-2006-2782,CVE-2006-2778,CVE-2006-2776,CVE-2006-2784,CVE-2006-2785,CVE-2006-2786,CVE-2006-2787,CVE-2006-2788) 200168 - CVE-2006-3801 Multiple Seamonkey issues (CVE-2006-3677, CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812) 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/firef... 6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm i386: 93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm 15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm ia64: 29ae3f60c50462267765855063edddf4 firefox-1.5.0.5-0.el4.1.ia64.rpm a2e18536c14f09611d49276b9af8ffa8 firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm ppc: 27c343290fd4c6fcf16323cd62f02e9b firefox-1.5.0.5-0.el4.1.ppc.rpm be5c0e93af729117a3c7153e58d50183 firefox-debuginfo-1.5.0.5-0.el4.1.ppc.rpm s390: 4be9436cc0d3cb1daee6f6962fb894ec firefox-1.5.0.5-0.el4.1.s390.rpm 4348ba2ef6e30a3e01137492373b6b11 firefox-debuginfo-1.5.0.5-0.el4.1.s390.rpm s390x: ddbb5e0ae4707724e08422de346aaedf firefox-1.5.0.5-0.el4.1.s390x.rpm db4a001815e2c6096122248ae9a22a4b firefox-debuginfo-1.5.0.5-0.el4.1.s390x.rpm x86_64: d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/... 6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm i386: 93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm 15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm x86_64: d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/firef... 6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm i386: 93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm 15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm ia64: 29ae3f60c50462267765855063edddf4 firefox-1.5.0.5-0.el4.1.ia64.rpm a2e18536c14f09611d49276b9af8ffa8 firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm x86_64: d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/firef... 6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm i386: 93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm 15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm ia64: 29ae3f60c50462267765855063edddf4 firefox-1.5.0.5-0.el4.1.ia64.rpm a2e18536c14f09611d49276b9af8ffa8 firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm x86_64: d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2788 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812 http://www.redhat.com/security/updates/classification/#cr... 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFEyqjvXlSAg2UNWIIRAht1AJ9/F6OyTVsnPHg3L8cf/9cJVfWmcQCbB9PA 7Tf3o4tdkJLNwMai8JUDDkc= =GX9n -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-...


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds