Your submission was sent successfully! Close

USN-468-1: Firefox vulnerabilities

01 June 2007

Firefox vulnerabilities

Releases

Details

Various flaws were discovered in the layout and JavaScript engines.
By tricking a user into opening a malicious web page, an attacker could
execute arbitrary code with the user's privileges. (CVE-2007-2867,
CVE-2007-2868)

A flaw was discovered in the form autocomplete feature. By tricking
a user into opening a malicious web page, an attacker could cause a
persistent denial of service. (CVE-2007-2869)

Nicolas Derouet discovered flaws in cookie handling. By tricking a user
into opening a malicious web page, an attacker could force the browser to
consume large quantities of disk or memory while processing long cookie
paths. (CVE-2007-1362)

A flaw was discovered in the same-origin policy handling of the
addEventListener JavaScript method. A malicious web site could exploit
this to modify the contents, or steal confidential data (such as
passwords), of other web pages. (CVE-2007-2870)

Chris Thomas discovered a flaw in XUL popups. A malicious web site
could exploit this to spoof or obscure portions of the browser UI,
such as the location bar. (CVE-2007-2871)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 7.04
  • firefox - 2.0.0.4+1-0ubuntu1
Ubuntu 6.10
  • firefox - 2.0.0.4+0dfsg-0ubuntu0.6.10
Ubuntu 6.06
  • firefox - 1.5.dfsg+1.5.0.12-0ubuntu0.6.06.1

After a standard system upgrade you need to restart Firefox to effect
the necessary changes.

Related notices