==================================================================== CERT-Renater Note d'Information No. 2012/VULN408 ____________________________________________________________________ DATE : 11/10/2012 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S) : Systems running Firefox versions prior to 16, ESR 10.0.8, Thunderbird versions prior to 16, ESR 10.0.8, SeaMonkey versions prior to 2.13. ====================================================================== http://www.mozilla.org/security/announce/2012/mfsa2012-74.html http://www.mozilla.org/security/announce/2012/mfsa2012-75.html http://www.mozilla.org/security/announce/2012/mfsa2012-76.html http://www.mozilla.org/security/announce/2012/mfsa2012-77.html http://www.mozilla.org/security/announce/2012/mfsa2012-78.html http://www.mozilla.org/security/announce/2012/mfsa2012-79.html http://www.mozilla.org/security/announce/2012/mfsa2012-80.html http://www.mozilla.org/security/announce/2012/mfsa2012-81.html http://www.mozilla.org/security/announce/2012/mfsa2012-82.html http://www.mozilla.org/security/announce/2012/mfsa2012-83.html http://www.mozilla.org/security/announce/2012/mfsa2012-84.html http://www.mozilla.org/security/announce/2012/mfsa2012-85.html http://www.mozilla.org/security/announce/2012/mfsa2012-86.html http://www.mozilla.org/security/announce/2012/mfsa2012-87.html ______________________________________________________________________ Mozilla Foundation Security Advisory 2012-74 Title: Miscellaneous memory safety hazards (rv:16.0/ rv:10.0.8) Impact: Critical Announced: October 9, 2012 Reporter: Mozilla Developers Products: Firefox, Thunderbird, SeaMonkey Fixed in: Firefox 16 Firefox ESR 10.0.8 Thunderbird 16 Thunderbird ESR 10.0.8 SeaMonkey 2.13 Description Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products. References Henrik Skupin, Jesse Ruderman and moz_bug_r_a4 reported memory safety problems and crashes that affect Firefox 15. Memory safety bugs fixed in Firefox 16 CVE-2012-3983 Christian Holler and Jesse Ruderman reported memory safety problems and crashes that affect Firefox ESR 10 and Firefox 15. Memory safety bugs fixed in Firefox ESR 10.0.8 and Firefox 16 CVE-2012-3982 _______________________________________________________________________ Mozilla Foundation Security Advisory 2012-75 Title: select element persistance allows for attacks Impact: Critical Announced: October 9, 2012 Reporter: David Bloom Products: Firefox, Thunderbird, SeaMonkey Fixed in: Firefox 16 Thunderbird 16 SeaMonkey 2.13 Description Security researcher David Bloom of Cue discovered that menu does not remove this window.When another menu is opened programmatically on a new page, the original dropdown menu can be used for URL spoofing, other evil CVE-2012-3984 Firefox 10.0.1 : Navigation away from a page with multiple active