Skip to content

customize
National Cyber Alert System
Technical Cyber Security Alert TA06-208A archive

Mozilla Products Contain Multiple Vulnerabilities

Original release date: July 27, 2006
Last revised: July 31, 2006
Source: US-CERT

Systems Affected

  • Mozilla SeaMonkey
  • Mozilla Firefox
  • Mozilla Thunderbird
  • Netscape Browser
Any products based on Mozilla components, specifically Gecko, may also be affected.

Overview

The Mozilla web browser and derived products contain several vulnerabilities, the most serious of which could allow a remote attacker to execute arbitrary code on an affected system.


I. Description

Several vulnerabilities have been reported in the Mozilla web browser and derived products. More detailed information is available in the individual vulnerability notes, including the following:

VU#476724 - Mozilla products fail to properly handle frame references

Mozilla products fail to properly handle frame or window references. This may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3801)

VU#670060 - Mozilla fails to properly release JavaScript references

Mozilla products fail to properly release memory. This vulnerability may allow a remote attacker to execute code on a vulnerable system.
(CVE-2006-3677)

VU#239124 - Mozilla fails to properly handle simultaneous XPCOM events

Mozilla products are vulnerable to memory corruption via simultaneous XPCOM events. This may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3113)

VU#265964 - Mozilla products contain a race condition

Mozilla products contain a race condition. This vulnerability may allow a remote attacker to execute code on a vulnerable system.
(CVE-2006-3803)

VU#897540 - Mozilla products VCard attachment buffer overflow

Mozilla products fail to properly handle malformed VCard attachments, allowing a buffer overflow to occur. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3804)

VU#876420 - Mozilla fails to properly handle garbage collection

The Mozilla JavaScript engine fails to properly perform garbage collection, which may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3805)

VU#655892 - Mozilla JavaScript engine contains multiple integer overflows

The Mozilla JavaScript engine contains multiple integer overflows. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3806)

VU#687396 - Mozilla products fail to properly validate JavaScript constructors

Mozilla products fail to properly validate references returned by JavaScript constructors. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3807)

VU#527676 - Mozilla contains multiple memory corruption vulnerabilities

Mozilla products contain multiple vulnerabilities that can cause memory corruption. This may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3811)


II. Impact

A remote, unauthenticated attacker could execute arbitrary code on a vulnerable system. An attacker may also be able to cause the vulnerable application to crash.


III. Solution

Upgrade

Upgrade to Mozilla Firefox 1.5.0.5, Mozilla Thunderbird 1.5.0.5, or SeaMonkey 1.0.3.

Netscape 8.1 is based on Firefox 1.0.7. Until a fixed version is available, please use the following workarounds:

Disable JavaScript and Java

These vulnerabilities can be mitigated by disabling JavaScript and Java in all affected products. For more information about configuring Firefox, please see the "Securing Your Web Browser" document. Netscape users should see the "Site Controls" document for details.


Appendix A. References



Feedback can be directed to US-CERT.


Produced 2006 by US-CERT, a government organization. Terms of use

Revision History

July 27, 2006: Initial release
July 31, 2006: Added Netscape information

Last updated July 31, 2006
print this document