Debian DSA-1160-2 : mozilla - several vulnerabilities

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote Debian host is missing a security-related update.

Description :

The latest security updates of Mozilla introduced a regression that
led to a dysfunctional attachment panel which warrants a correction to
fix this issue. For reference please find below the original advisory
text :

Several security related problems have been discovered in Mozilla
and derived products. The Common Vulnerabilities and Exposures
project identifies the following vulnerabilities :

- CVE-2006-2779
Mozilla team members discovered several crashes during
testing of the browser engine showing evidence of
memory corruption which may also lead to the execution
of arbitrary code. The last bit of this problem will
be corrected with the next update. You can prevent any
trouble by disabling Javascript. [MFSA-2006-32]

- CVE-2006-3805
The Javascript engine might allow remote attackers to
execute arbitrary code. [MFSA-2006-50]

- CVE-2006-3806
Multiple integer overflows in the Javascript engine
might allow remote attackers to execute arbitrary
code. [MFSA-2006-50]

- CVE-2006-3807
Specially crafted Javascript allows remote attackers
to execute arbitrary code. [MFSA-2006-51]

- CVE-2006-3808
Remote Proxy AutoConfig (PAC) servers could execute
code with elevated privileges via a specially crafted
PAC script. [MFSA-2006-52]

- CVE-2006-3809
Scripts with the UniversalBrowserRead privilege could
gain UniversalXPConnect privileges and possibly
execute code or obtain sensitive data. [MFSA-2006-53]

- CVE-2006-3810
A cross-site scripting vulnerability allows remote
attackers to inject arbitrary web script or HTML.
[MFSA-2006-54]

See also :

http://security-tracker.debian.org/tracker/CVE-2006-2779
http://security-tracker.debian.org/tracker/CVE-2006-3805
http://security-tracker.debian.org/tracker/CVE-2006-3806
http://security-tracker.debian.org/tracker/CVE-2006-3807
http://security-tracker.debian.org/tracker/CVE-2006-3808
http://security-tracker.debian.org/tracker/CVE-2006-3809
http://security-tracker.debian.org/tracker/CVE-2006-3810
http://www.debian.org/security/2006/dsa-1160

Solution :

Upgrade the mozilla package.

For the stable distribution (sarge) these problems have been fixed in
version 1.7.8-1sarge7.2.2.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Debian Local Security Checks

Nessus Plugin ID: 22702 (debian_DSA-1160.nasl)

Bugtraq ID: 18228
19181

CVE ID: CVE-2006-2779
CVE-2006-3805
CVE-2006-3806
CVE-2006-3807
CVE-2006-3808
CVE-2006-3809
CVE-2006-3810