GLSA-200408-22 : Mozilla, Firefox, Thunderbird, Galeon, Epiphany: New releases fix vulnerabilities

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-200408-22
(Mozilla, Firefox, Thunderbird, Galeon, Epiphany: New releases fix vulnerabilities)

Mozilla, Galeon, Epiphany, Mozilla Firefox and Mozilla Thunderbird
contain the following vulnerabilities:
All Mozilla tools use libpng for graphics. This library contains a
buffer overflow which may lead to arbitrary code execution.
If a user imports a forged Certificate Authority (CA) certificate,
it may overwrite and corrupt the valid CA already installed on the
machine.
Mozilla, Mozilla Firefox, and other gecko-based browsers also contain a
bug in their caching which may allow the SSL icon to remain visible,
even when the site in question is an insecure site.

Impact :

Users of Mozilla, Mozilla Firefox, and other gecko-based browsers are
susceptible to SSL certificate spoofing, a Denial of Service against
legitimate SSL sites, crashes, and arbitrary code execution. Users of
Mozilla Thunderbird are susceptible to crashes and arbitrary code
execution via malicious e-mails.

Workaround :

There is no known workaround for most of these vulnerabilities. All
users are advised to upgrade to the latest available version.

See also :

http://www.gentoo.org/security/en/glsa/glsa-200408-22.xml

Solution :

All users should upgrade to the latest stable version:
# emerge sync
# emerge -pv your-version
# emerge your-version

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: Gentoo Local Security Checks

Nessus Plugin ID: 14578 (gentoo_GLSA-200408-22.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0597
CVE-2004-0598
CVE-2004-0599
CVE-2004-0758
CVE-2004-0763