[SECURITY] Fedora Core 2 Update: mozilla-1.7.6-1.2.2

Christopher Aillon caillon at redhat.com
Fri Mar 25 21:35:04 UTC 2005

Fedora Update Notification

Product     : Fedora Core 2
Name        : mozilla
Version     : 1.7.6
Release     : 1.2.2
Summary     : Web browser and mail reader
Description :
Mozilla is an open-source web browser, designed for standards
compliance, performance and portability.

Update Information:

A buffer overflow bug was found in the way Mozilla processes GIF images. 
It is possible for an attacker to create a specially crafted GIF image, 
which when viewed by a victim will execute arbitrary code as the victim. 
The Common Vulnerabilities and Exposures project (cve.mitre.org) has 
assigned the name CAN-2005-0399 to this issue.

A bug was found in the way Mozilla responds to proxy auth requests. It 
is possible for a malicious webserver to steal credentials from a 
victims browser by issuing a 407 proxy authentication request. 

A bug was found in the way Mozilla displays dialog windows. It is 
possible that a malicious web page which is being displayed in a 
background tab could present the user with a dialog window appearing to 
come from the active page. (CAN-2004-1380)

A bug was found in the way Mozilla Mail handles cookies when loading 
content over HTTP regardless of the user's preference. It is possible 
that a particular user could be tracked through the use of malicious 
mail messages which load content over HTTP. (CAN-2005-0149)

A flaw was found in the way Mozilla displays international domain names. 
It is possible for an attacker to display a valid URL, tricking the user 
into thinking they are viewing a legitimate webpage when they are not. 

A bug was found in the way Mozilla handles pop-up windows. It is 
possible for a malicious website to control the content in an unrelated 
site's pop-up window. (CAN-2004-1156)

A bug was found in the way Mozilla saves temporary files. Temporary 
files are saved with world readable permissions, which could allow a 
local malicious user to view potentially sensitive data. (CAN-2005-0142)

A bug was found in the way Mozilla handles synthetic middle click 
events. It is possible for a malicious web page to steal the contents of 
a victims clipboard. (CAN-2005-0146)

A bug was found in the way Mozilla processes XUL content. If a malicious 
web page can trick a user into dragging an object, it is possible to 
load malicious XUL content. (CAN-2005-0401)

A bug was found in the way Mozilla loads links in a new tab which are 
middle clicked. A malicious web page could read local files or modify 
privileged chrom settings. (CAN-2005-0141)

A bug was found in the way Mozilla displays the secure site icon. A 
malicious web page can use a view-source URL targetted at a secure page, 
while loading an insecure page, yet the secure site icon shows the 
previous secure state. (CAN-2005-0144)

A bug was found in the way Mozilla displays the secure site icon. A 
malicious web page can display the secure site icon by loading a binary 
file from a secured site. (CAN-2005-0143)

A bug was found in the way Mozilla displays the download dialog window. 
A malicious site can obfuscate the content displayed in the source 
field, tricking a user into thinking they are downloading content from a 
trusted source. (CAN-2005-0585)

Users of Mozilla are advised to upgrade to this updated package which 
contains Mozilla version 1.7.6 to correct these issues.

* Wed Mar 23 2005 Christopher Aillon <caillon at redhat.com> 37:1.7.6-1.2.2

- Install all-redhat.js pref files

* Wed Mar 23 2005 Christopher Aillon <caillon at redhat.com> 37:1.7.6-1.2.1

- Update to 1.7.6
- Import changes from FC-3

This update can be downloaded from:

670cd6dfd4638a8b720c5524dfda0904  SRPMS/mozilla-1.7.6-1.2.2.src.rpm
250c3130e8e6155be3aad1ba87230558  x86_64/mozilla-1.7.6-1.2.2.x86_64.rpm
fbcc83d64cde004cec0a7bc1aca02e58  x86_64/mozilla-nspr-1.7.6-1.2.2.x86_64.rpm
6a05ed7fb6d14e24f3be8c175ff4c8b3  x86_64/mozilla-nss-1.7.6-1.2.2.x86_64.rpm
b801fab02c0c048598f638b4a28fae3e  x86_64/mozilla-mail-1.7.6-1.2.2.x86_64.rpm
9772a6749e5e2bac54844fade15e1b14  x86_64/mozilla-chat-1.7.6-1.2.2.x86_64.rpm
241e38a280bf30ab84eeb87a916ba5ac  x86_64/mozilla-1.7.6-1.2.2.i386.rpm
8059d43c76c69a9dcdfbc80bab47c61d  x86_64/mozilla-nspr-1.7.6-1.2.2.i386.rpm
25095410d01ea542dc1e429afb8c2b41  x86_64/mozilla-nss-1.7.6-1.2.2.i386.rpm
13eecc00d20fea369a3f2826235858b7  x86_64/mozilla-devel-1.7.6-1.2.2.i386.rpm
599cb8a1eeea64e30761f182e1e4b8c9  x86_64/mozilla-mail-1.7.6-1.2.2.i386.rpm
c88c78fe40130f350fa63eb5012a7519  x86_64/mozilla-chat-1.7.6-1.2.2.i386.rpm
241e38a280bf30ab84eeb87a916ba5ac  i386/mozilla-1.7.6-1.2.2.i386.rpm
8059d43c76c69a9dcdfbc80bab47c61d  i386/mozilla-nspr-1.7.6-1.2.2.i386.rpm
25095410d01ea542dc1e429afb8c2b41  i386/mozilla-nss-1.7.6-1.2.2.i386.rpm
13eecc00d20fea369a3f2826235858b7  i386/mozilla-devel-1.7.6-1.2.2.i386.rpm
599cb8a1eeea64e30761f182e1e4b8c9  i386/mozilla-mail-1.7.6-1.2.2.i386.rpm
c88c78fe40130f350fa63eb5012a7519  i386/mozilla-chat-1.7.6-1.2.2.i386.rpm

This update can also be installed with the Update Agent; you can
launch the Update Agent with the 'up2date' command.

More information about the announce mailing list