PROBLEM: | There is a vulnerability in Firefox that could crash in Mozilla's block reflow code that could be used by an attacker to crash the browser and run arbitrary code on the victim's computer. |
PLATFORM: | Firefox versions prior to 2.0.0.15 Debian GNU/Linux 4.0 (etch) |
DAMAGE: | Execute arbitrary code and DoS. |
SOLUTION: | Upgrade to the appropriate version. |
VULNERABILITY ASSESSMENT: |
The risk is MEDIUM. A remote, unauthenticated attacker may be able to execute arbitrary code or cause a vulnerable browser to crash. |
CVSS 2 BASE SCORE: TEMPORAL SCORE: VECTOR: |
7.5 6.2 (AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C) |
[***** Start Mozilla Foundation Security Advisory 2008-33 *****]
Title: Crash and remote code execution in block reflow
Impact: Critical
Announced: July 1, 2008
Reporter: Astabis (iSIGHT Partners GVP Program)
Products: Firefox 2, Thunderbird 2, SeaMonkey
Fixed in: Firefox 2.0.0.15
SeaMonkey 1.1.10
Security research firm Astabis reported a vulnerability in Firefox 2 submitted through the iSIGHT Partners GVP Program by Greg McManus, Primary GVP Researcher. The reported crash in Mozilla's block reflow code could be used by an attacker to crash the browser and run arbitrary code on the victim's computer.
This vulnerability does not affect Firefox 3.
Thunderbird shares the browser engine with Firefox and could be vulnerable if JavaScript were to be enabled in mail. This is not the default setting and we strongly discourage users from running JavaScript in mail.
Disable JavaScript until a version containing these fixes can be installed.
[***** End Mozilla Foundation Security Advisory 2008-33 *****]
Voice: +1 925-422-8193 (7 x 24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@ciac.org World Wide Web: http://www.ciac.org/ Anonymous FTP: ftp.ciac.org