=====================================================================
                                   CERT-Renater

                        Note d'Information No. 2010/VULN514
_____________________________________________________________________

DATE                      : 10/12/2010

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : System running Firefox versions prior to 3.5.16, 3.6.13,
                              SeaMonkey versions prior to 2.0.11,
                              Thunderbird versions prior to 3.1.7, 3.0.11.

======================================================================
http://www.mozilla.org/security/announce/2010/mfsa2010-84.html
http://www.mozilla.org/security/announce/2010/mfsa2010-83.html
http://www.mozilla.org/security/announce/2010/mfsa2010-82.html
http://www.mozilla.org/security/announce/2010/mfsa2010-81.html
http://www.mozilla.org/security/announce/2010/mfsa2010-79.html
http://www.mozilla.org/security/announce/2010/mfsa2010-78.html
http://www.mozilla.org/security/announce/2010/mfsa2010-77.html
http://www.mozilla.org/security/announce/2010/mfsa2010-76.html
http://www.mozilla.org/security/announce/2010/mfsa2010-75.html
http://www.mozilla.org/security/announce/2010/mfsa2010-74.html
______________________________________________________________________

Mozilla Foundation Security Advisory 2010-84

Title: XSS hazard in multiple character encodings
Impact: Moderate
Announced: December 9, 2010
Reporter: Yosuke Hasegawa, Masatoshi Kimura
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.13
  Firefox 3.5.16
  SeaMonkey 2.0.11

Description

Security researchers Yosuke Hasegawa and Masatoshi Kimura reported that
the x-mac-arabic, x-mac-farsi and x-mac-hebrew character encodings are
vulnerable to XSS attacks due to some characters being converted to
angle brackets when displayed by the rendering engine. Sites using
these character encodings would thus be potentially vulnerable to
script injection attacks if their script filtering code fails to
strip out these specific characters.
References

    * https://bugzilla.mozilla.org/show_bug.cgi?id=601429
    * CVE-2010-3770
_______________________________________________________________________

Mozilla Foundation Security Advisory 2010-83

Title: Location bar SSL spoofing using network error page
Impact: High
Announced: December 9, 2010
Reporter: Michal Zalewski
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.13
  Firefox 3.5.16
  SeaMonkey 2.0.11

Description

Google security researcher Michal Zalewski reported that when a window
was opened to a site resulting in a network or certificate error page,
the opening site could access the document inside the opened window and
inject arbitrary content. An attacker could use this bug to spoof the
location bar and trick a user into thinking they were on a different
site than they actually were.

References

    * https://bugzilla.mozilla.org/show_bug.cgi?id=602780
    * CVE-2010-3774

Portions of this content are ©1998–2010 by individual mozilla.org
contributors. Content available under a Creative Commons license.
____________________________________________________________________

Mozilla Foundation Security Advisory 2010-82

Title: Incomplete fix for CVE-2010-0179
Impact: Critical
Announced: December 9, 2010
Reporter: moz_bug_r_a4
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.13
  Firefox 3.5.16
  SeaMonkey 2.0.11

Description

Mozilla security researcher moz_bug_r_a4 reported that the fix for
CVE-2010-0179 could be circumvented permitting the execution of arbitrary
JavaScript with chrome privileges.

References

    * https://bugzilla.mozilla.org/show_bug.cgi?id=554449
    * CVE-2010-3773
______________________________________________________________________

Mozilla Foundation Security Advisory 2010-81

Title: Integer overflow vulnerability in NewIdArray
Impact: Critical
Announced: December 9, 2010
Reporter: regenrecht
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.13
  Firefox 3.5.16
  SeaMonkey 2.0.11

Description

Security researcher regenrecht reported via TippingPoint's Zero Day
Initiative that JavaScript arrays were vulnerable to an integer overflow
vulnerability. The report demonstrated that an array could be constructed
containing a very large number of items such that when memory was allocated
to store the array items, the integer value used to calculate the buffer
size would overflow resulting in too small a buffer being allocated.
Subsequent use of the array object could then result in data being written
past the end of the buffer and causing memory corruption.


References

    * https://bugzilla.mozilla.org/show_bug.cgi?id=599468
    * CVE-2010-3767

Portions of this content are ©1998–2010 by individual mozilla.org
contributors. Content available under a Creative Commons license.
_______________________________________________________________________

Mozilla Foundation Security Advisory 2010-80

Title: Use-after-free error with nsDOMAttribute MutationObserver
Impact: Critical
Announced: December 9, 2010
Reporter: regenrecht
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.13
  Firefox 3.5.16
  SeaMonkey 2.0.11

Description

Security researcher regenrecht reported via TippingPoint's Zero Day
Initiative that a nsDOMAttribute node can be modified without informing
the iterator object responsible for various DOM traversals. This flaw
could lead to a inconsistent state where the iterator points to an
object it believes is part of the DOM but actually points to some
other object. If such an object had been deleted and its memory
reclaimed by the system, then the iterator could be used to call
into attacker-controlled memory.

References

    * https://bugzilla.mozilla.org/show_bug.cgi?id=590771
    * CVE-2010-3766
______________________________________________________________________

Mozilla Foundation Security Advisory 2010-79

Title: Java security bypass from LiveConnect loaded via data: URL meta refresh
Impact: Critical
Announced: December 9, 2010
Reporter: Gregory Fleischer
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.13
  Firefox 3.5.16
  SeaMonkey 2.0.11
Description

Security researcher Gregory Fleischer reported that when a Java LiveConnect
script was loaded via a data: URL which redirects via a meta refresh, then
the resulting plugin object was created with the wrong security principal
and thus received elevated privileges such as the abilities to read local
files, launch processes, and create network connections.


References

    * Java LiveConnect bugs
    * CVE-2010-3775

Portions of this content are ©1998–2010 by individual mozilla.org contributors.
Content available under a Creative Commons license.
________________________________________________________________________

Mozilla Foundation Security Advisory 2010-78

Title: Add support for OTS font sanitizer
Impact: Critical
Announced: December 9, 2010
Reporter: Marc Schoenefeld, Christoph Diehl
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 3.6.13
  Firefox 3.5.16
  Thunderbird 3.1.7
  Thunderbird 3.0.11
  SeaMonkey 2.0.11

Description

Mozilla added the OTS font sanitizing library to prevent downloadable
fonts from exposing vulnerabilities in the underlying OS font code. This
library mitigates against several issues independently reported by
Red Hat Security Response Team member Marc Schoenefeld and Mozilla
security researcher Christoph Diehl.

References

    * https://bugzilla.mozilla.org/show_bug.cgi?id=527276
    * CVE-2010-3768
______________________________________________________________________

Mozilla Foundation Security Advisory 2010-77

Title: Crash and remote code execution using HTML tags inside a XUL tree
Impact: Critical
Announced: December 9, 2010
Reporter: wushi
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.13
  Firefox 3.5.16
  SeaMonkey 2.0.11

Description

Security researcher wushi of team509 reported that when a XUL tree
had an HTML <div> element nested inside a <treechildren> element
then code attempting to display content in the XUL tree would
incorrectly treat the <div> element as a parent node to tree
content underneath it resulting in incorrect indexes being
calculated for the child content. These incorrect indexes were
used in subsequent array operations which resulted in writing
data past the end of an allocated buffer. An attacker could use
this issue to crash a victim's browser and run arbitrary code on
their machine.

References

    * https://bugzilla.mozilla.org/show_bug.cgi?id=594547
    * CVE-2010-3772

Portions of this content are ©1998–2010 by individual mozilla.org
contributors. Content available under a Creative Commons license.
_______________________________________________________________________

Mozilla Foundation Security Advisory 2010-76

Title: Chrome privilege escalation with window.open and <isindex> element
Impact: Critical
Announced: December 9, 2010
Reporter: echo
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.13
  Firefox 3.5.16
  SeaMonkey 2.0.11

Description

Security researcher echo reported that a web page could open a
window with an about:blank location and then inject an <isindex>
element into that page which upon submission would redirect to a
chrome: document. The effect of this defect was that the original
page would wind up with a reference to a chrome-privileged object,
the opened window, which could be leveraged for privilege escalation
attacks.

Mozilla security researcher moz_bug_r_a4 provided proof-of-concept
code demonstrating how the above vulnerability could be used to run
arbitrary code with chrome privileges.

References

    * https://bugzilla.mozilla.org/show_bug.cgi?id=609437
    * CVE-2010-3771
______________________________________________________________________

Mozilla Foundation Security Advisory 2010-75

Title: Buffer overflow while line breaking after document.write with
long string

Impact: Critical
Announced: December 9, 2010
Reporter: Dirk Heinrich
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 3.6.13
  Firefox 3.5.16
  Thunderbird 3.1.7
  Thunderbird 3.0.11
  SeaMonkey 2.0.11

Description

Dirk Heinrich reported that on Windows platforms when document.write()
was called with a very long string a buffer overflow was caused in line
breaking routines attempting to process the string for display. Such
cases triggered an invalid read past the end of an array causing a crash
which an attacker could potentially use to run arbitrary code on a
victim's computer.

References

    * https://bugzilla.mozilla.org/show_bug.cgi?id=608336
    * CVE-2010-3769
_______________________________________________________________________

Mozilla Foundation Security Advisory 2010-74

Title: Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16)
Impact: Critical
Announced: December 9, 2010
Reporter: Mozilla developers and community
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 3.6.13
  Firefox 3.5.16
  Thunderbird 3.1.7
  Thunderbird 3.0.11
  SeaMonkey 2.0.11

Description

Mozilla developers identified and fixed several memory safety bugs in
the browser engine used in Firefox and other Mozilla-based products.
Some of these bugs showed evidence of memory corruption under certain
circumstances, and we presume that with enough effort at least some of
these could be exploited to run arbitrary code.

References

Jesee Ruderman, Andreas Gal, Nils, and Brian Hackett reported memory
safety problems that affected Firefox 3.6 and Firefox 3.5.

    * Memory safety bugs - Firefox 3.6, Firefox 3.5
    * CVE-2010-3776

Igor Bukanov reported a memory safety problem that was fixed in Firefox
3.6 only.

    * https://bugzilla.mozilla.org/show_bug.cgi?id=599607
    * CVE-2010-3777

Jesse Ruderman reported a crash which affected Firefox 3.5 only.

    * https://bugzilla.mozilla.org/show_bug.cgi?id=411835
    * CVE-2010-3778


======================================================================

          =========================================================
          Les serveurs de référence du CERT-Renater
          http://www.urec.fr/securite
          http://www.cru.fr/securite
          http://www.renater.fr
          =========================================================
          + CERT-RENATER          | tel : 01-53-94-20-44          +
          + 23 - 25 Rue Daviel    | fax : 01-53-94-20-41          +
          + 75013 Paris           | email: certsvp@renater.fr     +
          =========================================================

