Debian DSA-1192-1 : mozilla - several vulnerabilities

critical Nessus Plugin ID 22733

Synopsis

The remote Debian host is missing a security-related update.

Description

Several security related problems have been discovered in Mozilla and derived products such as Mozilla Thunderbird. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities :

- CVE-2006-2788 Fernando Ribeiro discovered that a vulnerability in the getRawDER function allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code.

- CVE-2006-4340 Daniel Bleichenbacher recently described an implementation error in RSA signature verification that cause the application to incorrectly trust SSL certificates.

- CVE-2006-4565, CVE-2006-4566 Priit Laes reported that a JavaScript regular expression can trigger a heap-based buffer overflow which allows remote attackers to cause a denial of service and possibly execute arbitrary code.

- CVE-2006-4568 A vulnerability has been discovered that allows remote attackers to bypass the security model and inject content into the sub-frame of another site.

- CVE-2006-4570 Georgi Guninski demonstrated that even with JavaScript disabled in mail (the default) an attacker can still execute JavaScript when a mail message is viewed, replied to, or forwarded.

- CVE-2006-4571 Multiple unspecified vulnerabilities in Firefox, Thunderbird and SeaMonkey allow remote attackers to cause a denial of service, corrupt memory, and possibly execute arbitrary code.

Solution

Upgrade the Mozilla packages.

For the stable distribution (sarge) these problems have been fixed in version 1.7.8-1sarge7.3.1.

See Also

https://security-tracker.debian.org/tracker/CVE-2006-2788

https://security-tracker.debian.org/tracker/CVE-2006-4340

https://security-tracker.debian.org/tracker/CVE-2006-4565

https://security-tracker.debian.org/tracker/CVE-2006-4566

https://security-tracker.debian.org/tracker/CVE-2006-4568

https://security-tracker.debian.org/tracker/CVE-2006-4570

https://security-tracker.debian.org/tracker/CVE-2006-4571

http://www.debian.org/security/2006/dsa-1192

Plugin Details

Severity: Critical

ID: 22733

File Name: debian_DSA-1192.nasl

Version: 1.24

Type: local

Agent: unix

Published: 10/14/2006

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:mozilla, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 10/6/2006

Vulnerability Publication Date: 12/27/2005

Reference Information

CVE: CVE-2006-2788, CVE-2006-4340, CVE-2006-4565, CVE-2006-4566, CVE-2006-4568, CVE-2006-4570, CVE-2006-4571

BID: 20042

CWE: 119, 20, 79

DSA: 1192