=====================================================================
                                    CERT-Renater

                         Note d'Information No. 2011/VULN166
_____________________________________________________________________

DATE                      : 02/03/2011

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running Firefox versions prior to 3.6.14, 3.5.17,
                              SeaMonkey versions prior to 2.0.12,
                              Thunderbird versions prior to 3.1.8.

======================================================================
http://www.mozilla.org/security/announce/2011/mfsa2011-10.html
http://www.mozilla.org/security/announce/2011/mfsa2011-09.html
http://www.mozilla.org/security/announce/2011/mfsa2011-08.html
http://www.mozilla.org/security/announce/2011/mfsa2011-07.html
http://www.mozilla.org/security/announce/2011/mfsa2011-06.html
http://www.mozilla.org/security/announce/2011/mfsa2011-05.html
http://www.mozilla.org/security/announce/2011/mfsa2011-04.html
http://www.mozilla.org/security/announce/2011/mfsa2011-03.html
http://www.mozilla.org/security/announce/2011/mfsa2011-02.html
http://www.mozilla.org/security/announce/2011/mfsa2011-01.html
______________________________________________________________________

Mozilla Foundation Security Advisory 2011-10

Title: CSRF risk with plugins and 307 redirects
Impact: High
Announced: March 1, 2011
Reporter: Peleus Uhley
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.14
   Firefox 3.5.17
   SeaMonkey 2.0.12

Description

Adobe security researcher Peleus Uhley reported that when plugin-initiated
requests receive a 307 redirect response, the plugin is not notified and
the request is forwarded to the new location. This is true even for
cross-site redirects, so any custom headers that were added as part of
the initial request would be forwarded intact across origins. This poses
a CSRF risk for web applications that rely on custom headers only being
present in requests from their own origin.

References

     * https://bugzilla.mozilla.org/show_bug.cgi?id=573873
     * CVE-2011-0059
_______________________________________________________________________

Mozilla Foundation Security Advisory 2011-09

Title: Crash caused by corrupted JPEG image
Impact: Critical
Announced: March 1, 2011
Reporter: Jordi Chancel
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 3.6.14
   Thunderbird 3.1.8
   SeaMonkey 2.0.12

Description

Security researcher Jordi Chancel reported that a JPEG image could be
constructed that would be decoded incorrectly, causing data to be written
past the end of a buffer created to store the image. An attacker could
potentially craft such an image that would cause malicious code to be
stored in memory and then later executed on a victim's computer.

Firefox 3.5 was not affected by this issue.

References

     * https://bugzilla.mozilla.org/show_bug.cgi?id=610601
     * CVE-2011-0061
_______________________________________________________________________

Mozilla Foundation Security Advisory 2011-08

Title: ParanoidFragmentSink allows javascript: URLs in chrome documents
Impact: Moderate
Announced: March 1, 2011
Reporter: Roberto Suggi Liverani
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 3.6.14
   Firefox 3.5.17
   Thunderbird 3.1.8
   SeaMonkey 2.0.12

Description

Mozilla security developer Roberto Suggi Liverani reported that
ParanoidFragmentSink, a class used to sanitize potentially unsafe
HTML for display, allows javascript: URLs and other inline JavaScript
when the embedding document is a chrome document. While there are no
unsafe uses of this class in any released products, extension code
could have potentially used it in an unsafe manner.

References

     * https://bugzilla.mozilla.org/show_bug.cgi?id=562547
     * CVE-2010-1585
_______________________________________________________________________

Mozilla Foundation Security Advisory 2011-07

Title: Memory corruption during text run construction (Windows)
Impact: Critical
Announced: March 1, 2011
Reporter: Alex Miller
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.14
   Firefox 3.5.17
   SeaMonkey 2.0.12

Description

Alex Miller reported that when very long strings were constructed and
inserted into an HTML document, the browser would incorrectly construct
the layout objects used to display the text. Under such conditions an
incorrect length would be calculated for a text run resulting in too
small of a memory buffer being allocated to store the text. This issue
could be used by an attacker to write data past the end of the buffer
and execute malicious code on a victim's computer.

References

     * https://bugzilla.mozilla.org/show_bug.cgi?id=607160
     * CVE-2011-0058
________________________________________________________________________

Mozilla Foundation Security Advisory 2011-06

Title: Use-after-free error using Web Workers
Impact: Critical
Announced: March 1, 2011
Reporter: Daniel Kozlowski
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.14
   Firefox 3.5.17
   SeaMonkey 2.0.12

Description

Daniel Kozlowski reported that a JavaScript Worker could be used to keep
a reference to an object that could be freed during garbage collection.
Subsequent calls through this deleted reference could cause attacker-controlled
memory to be executed on a victim's computer.

References

     * https://bugzilla.mozilla.org/show_bug.cgi?id=626631
     * CVE-2011-0057
_______________________________________________________________________

Mozilla Foundation Security Advisory 2011-05

Title: Buffer overflow in JavaScript atom map
Impact: Critical
Announced: March 1, 2011
Reporter: Christian Holler
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.14
   Firefox 3.5.17
   SeaMonkey 2.0.12

Description

Security researcher Christian Holler reported that the JavaScript engine's
internal mapping of string values contained an error in cases where the number
of values being stored was above 64K. In such cases an offset pointer was
manually moved forwards and backwards to access the larger address space.
If an exception was thrown between the time that the offset pointer was
moved forward and the time it was reset, then the exception object would
be read from an invalid memory address, potentially executing
attacker-controlled memory.

References

     * https://bugzilla.mozilla.org/show_bug.cgi?id=622015
     * CVE-2011-0056
_______________________________________________________________________

Mozilla Foundation Security Advisory 2011-04

Title: Buffer overflow in JavaScript upvarMap
Impact: Critical
Announced: March 1, 2011
Reporter: Christian Holler
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.14
   Firefox 3.5.17
   SeaMonkey 2.0.12

Description

Security researcher Christian Holler reported that the JavaScript engine's
internal memory mapping of non-local JS variables contained a buffer overflow
  which could potentially be used by an attacker to run arbitrary code on
a victim's computer.

References

     * https://bugzilla.mozilla.org/show_bug.cgi?id=615657
     * CVE-2011-0054

_______________________________________________________________________

Mozilla Foundation Security Advisory 2011-03

Title: Use-after-free error in JSON.stringify
Impact: Critical
Announced: March 1, 2011
Reporter: regenrecht
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.14
   Firefox 3.5.17
   SeaMonkey 2.0.12

Description

Security researcher regenrecht reported via TippingPoint's Zero Day
Initiative that a method used by JSON.stringify contained a use-after-free
error in which a currently in-use pointer was freed and subsequently
dereferenced. This could lead to arbitrary code execution if an attacker
was able to store malicious code in the freed section of memory.

Mozilla developer Igor Bukanov also independently discovered and reported
this issue two weeks after the initial report was received.

References

     * JSON.stringify dangling pointer bugs
     * CVE-2011-0055

_______________________________________________________________________

Mozilla Foundation Security Advisory 2011-02

Title: Recursive eval call causes confirm dialogs to evaluate to true
Impact: Critical
Announced: March 1, 2011
Reporter: Zach Hoffman
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.14
   Firefox 3.5.17
   SeaMonkey 2.0.12

Description

Security researcher Zach Hoffman reported that a recursive call to eval()
wrapped in a try/catch statement places the browser into a inconsistent state.
Any dialog box opened in this state is displayed without text and with
non-functioning buttons. Closing the window causes the dialog to evaluate
to true. An attacker could use this issue to force a user into accepting
any dialog, such as one granting elevated privileges to the page presenting
the dialog.

References

     * https://bugzilla.mozilla.org/show_bug.cgi?id=616659
     * CVE-2011-0051

Portions of this content are ©1998–2011 by individual mozilla.org contributors.
Content available under a Creative Commons license.

______________________________________________________________________

Mozilla Foundation Security Advisory 2011-01

Title: Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17)
Impact: Critical
Announced: March 1, 2011
Reporter: Mozilla developers and community
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 3.6.14
   Firefox 3.5.17
   Thunderbird 3.1.8
   SeaMonkey 2.0.12

Description

Mozilla developers identified and fixed several memory safety bugs in the
browser engine used in Firefox and other Mozilla-based products. Some of these
bugs showed evidence of memory corruption under certain circumstances, and we
presume that with enough effort at least some of these could be exploited to
run arbitrary code.

References

Jesse Ruderman, Igor Bukanov, Olli Pettay, Gary Kwong, Jeff Walden, Henry Sivonen,
Martijn Wargers, David Baron and Marcia Knous reported memory safety problems that
affected Firefox 3.6 and Firefox 3.5.

     * Memory safety bugs - Firefox 3.6, Firefox 3.5
     * CVE-2011-0053

Igor Bukanov and Gary Kwong reported memory safety problems that affected
Firefox 3.6 only.

     * Memory safety bugs - Firefox 3.6
     * CVE-2011-0062


======================================================================

           =========================================================
           Les serveurs de référence du CERT-Renater
           http://www.urec.fr/securite
           http://www.cru.fr/securite
           http://www.renater.fr
           =========================================================
           + CERT-RENATER          | tel : 01-53-94-20-44          +
           + 23 - 25 Rue Daviel    | fax : 01-53-94-20-41          +
           + 75013 Paris           | email: certsvp@renater.fr     +
           =========================================================
