Skip to navigation

Security Advisory Critical: Firefox security update

Advisory: RHSA-2007:0079-2
Type: Security Advisory
Severity: Critical
Issued on: 2007-02-23
Last updated on: 2007-02-23
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2006-6077
CVE-2007-0008
CVE-2007-0009
CVE-2007-0775
CVE-2007-0777
CVE-2007-0778
CVE-2007-0779
CVE-2007-0780
CVE-2007-0800
CVE-2007-0981
CVE-2007-0994
CVE-2007-0995
CVE-2007-0996
CVE-2007-1092

Details

Updated firefox packages that fix several security bugs are now available
for Red Hat Enterprise Linux 4.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

Mozilla Firefox is an open source Web browser.

Several flaws were found in the way Firefox processed certain malformed
JavaScript code. A malicious web page could execute JavaScript code in such
a way that may result in Firefox crashing or executing arbitrary code as
the user running Firefox. (CVE-2007-0775, CVE-2007-0777)

Several cross-site scripting (XSS) flaws were found in the way Firefox
processed certain malformed web pages. A malicious web page could display
misleading information which may result in a user unknowingly divulging
sensitive information such as a password. (CVE-2006-6077, CVE-2007-0995,
CVE-2007-0996)

A flaw was found in the way Firefox cached web pages on the local disk. A
malicious web page may be able to inject arbitrary HTML into a browsing
session if the user reloads a targeted site. (CVE-2007-0778)

A flaw was found in the way Firefox displayed certain web content. A
malicious web page could generate content which could overlay user
interface elements such as the hostname and security indicators, tricking a
user into thinking they are visiting a different site. (CVE-2007-0779)

Two flaws were found in the way Firefox displayed blocked popup windows. If
a user can be convinced to open a blocked popup, it is possible to read
arbitrary local files, or conduct an XSS attack against the user.
(CVE-2007-0780, CVE-2007-0800)

Two buffer overflow flaws were found in the Network Security Services (NSS)
code for processing the SSLv2 protocol. Connecting to a malicious secure
web server could cause the execution of arbitrary code as the user running
Firefox. (CVE-2007-0008, CVE-2007-0009)

A flaw was found in the way Firefox handled the "location.hostname" value
during certain browser domain checks. This flaw could allow a malicious web
site to set domain cookies for an arbitrary site, or possibly perform an
XSS attack. (CVE-2007-0981)

Users of Firefox are advised to upgrade to these erratum packages, which
contain Firefox version 1.5.0.10 that corrects these issues.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
firefox-1.5.0.10-0.1.el4.src.rpm
File outdated by:  RHSA-2012:0142
    MD5: fd579d11e1a502a2173ab1780820a26a
 
IA-32:
firefox-1.5.0.10-0.1.el4.i386.rpm
File outdated by:  RHSA-2012:0142
    MD5: 4cd4889a0517e9f6e78af778756d4a41
 
x86_64:
firefox-1.5.0.10-0.1.el4.x86_64.rpm
File outdated by:  RHSA-2012:0142
    MD5: 2483e1863a431c2ac987cb17c169219a
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
firefox-1.5.0.10-0.1.el4.src.rpm
File outdated by:  RHSA-2012:0142
    MD5: fd579d11e1a502a2173ab1780820a26a
 
IA-32:
firefox-1.5.0.10-0.1.el4.i386.rpm
File outdated by:  RHSA-2012:0142
    MD5: 4cd4889a0517e9f6e78af778756d4a41
 
IA-64:
firefox-1.5.0.10-0.1.el4.ia64.rpm
File outdated by:  RHSA-2012:0142
    MD5: 09bfead1018fad7afc4594a8e8e7bd26
 
PPC:
firefox-1.5.0.10-0.1.el4.ppc.rpm
File outdated by:  RHSA-2012:0142
    MD5: 1da627d9f44db48109bfa18a3f0cc2e5
 
s390:
firefox-1.5.0.10-0.1.el4.s390.rpm
File outdated by:  RHSA-2012:0142
    MD5: cfb43f8a002a70513d5cfc098884d52e
 
s390x:
firefox-1.5.0.10-0.1.el4.s390x.rpm
File outdated by:  RHSA-2012:0142
    MD5: 32df66e4d963123c0ca4b2cc645de754
 
x86_64:
firefox-1.5.0.10-0.1.el4.x86_64.rpm
File outdated by:  RHSA-2012:0142
    MD5: 2483e1863a431c2ac987cb17c169219a
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
firefox-1.5.0.10-0.1.el4.src.rpm
File outdated by:  RHSA-2012:0142
    MD5: fd579d11e1a502a2173ab1780820a26a
 
IA-32:
firefox-1.5.0.10-0.1.el4.i386.rpm
File outdated by:  RHSA-2012:0142
    MD5: 4cd4889a0517e9f6e78af778756d4a41
 
IA-64:
firefox-1.5.0.10-0.1.el4.ia64.rpm
File outdated by:  RHSA-2012:0142
    MD5: 09bfead1018fad7afc4594a8e8e7bd26
 
x86_64:
firefox-1.5.0.10-0.1.el4.x86_64.rpm
File outdated by:  RHSA-2012:0142
    MD5: 2483e1863a431c2ac987cb17c169219a
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
firefox-1.5.0.10-0.1.el4.src.rpm
File outdated by:  RHSA-2012:0142
    MD5: fd579d11e1a502a2173ab1780820a26a
 
IA-32:
firefox-1.5.0.10-0.1.el4.i386.rpm
File outdated by:  RHSA-2012:0142
    MD5: 4cd4889a0517e9f6e78af778756d4a41
 
IA-64:
firefox-1.5.0.10-0.1.el4.ia64.rpm
File outdated by:  RHSA-2012:0142
    MD5: 09bfead1018fad7afc4594a8e8e7bd26
 
x86_64:
firefox-1.5.0.10-0.1.el4.x86_64.rpm
File outdated by:  RHSA-2012:0142
    MD5: 2483e1863a431c2ac987cb17c169219a
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

202352 - Firefox 1.5.0.5 startup script not updated for the add-on based locale
229802 - CVE-2007-0775 Multiple Firefox flaws (CVE-2007-0777, CVE-2007-0995, CVE-2007-0996, CVE-2006-6077, CVE-2007-0778, CVE-2007-0779, CVE-2007-0780, CVE-2007-0800, CVE-2007-0008, CVE-2007-0009, CVE-2007-0981)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/