foundation-security-advisories/announce/2007/mfsa2007-01.md

109 строки
4.9 KiB
Markdown
Исходник Постоянная ссылка Обычный вид История

2014-08-06 09:00:40 +04:00
---
2014-07-15 19:04:48 +04:00
announced: February 23, 2007
2014-08-06 09:00:40 +04:00
fixed_in:
- Firefox 2.0.0.2
- Firefox 1.5.0.10
- Thunderbird 1.5.0.10
- SeaMonkey 1.0.8
2014-07-15 19:04:48 +04:00
impact: Critical
reporter: Mozilla developers and community
title: Crashes with evidence of memory corruption (rv:1.8.0.10/1.8.1.2)
2014-08-06 09:00:40 +04:00
---
<h3>Description</h3>
<p>As part of the Firefox 2.0.0.2 and 1.5.0.10 update releases we fixed
several bugs to improve the stability of the product. Some of these were
crashes that showed evidence of memory corruption and we presume that
with enough effort at least some of these could be exploited to run
arbitrary code.</p>
<p class="note">Thunderbird shares the browser engine with Firefox
and could be vulnerable if JavaScript were to be enabled in
mail. This is not the default setting and we strongly discourage users from
running JavaScript in mail. Without further investigation we cannot rule out
the possibility that for some of these an attacker might be able to prepare
memory for exploitation through some means other than JavaScript, such as
large images.</p>
<h3>Workaround</h3>
<p>Upgrade to the fixed versions. Do not enable JavaScript in Thunderbird
or the mail portions of SeaMonkey.</p>
<h3>References</h3>
<p>Jesse Ruderman, Martijn Wargers and Olli Pettay reported crashes in
the layout engine</p>
<ul>
<li>
<a class="ex-ref" href="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0775">CVE-2007-0775</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=326864">
https://bugzilla.mozilla.org/show_bug.cgi?id=326864</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=344228">
https://bugzilla.mozilla.org/show_bug.cgi?id=344228</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=359371">
https://bugzilla.mozilla.org/show_bug.cgi?id=359371</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=367243">
https://bugzilla.mozilla.org/show_bug.cgi?id=367243</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=369413">
https://bugzilla.mozilla.org/show_bug.cgi?id=369413</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=337716">
https://bugzilla.mozilla.org/show_bug.cgi?id=337716</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=343293">
https://bugzilla.mozilla.org/show_bug.cgi?id=343293</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=362724">
https://bugzilla.mozilla.org/show_bug.cgi?id=362724</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=363813">
https://bugzilla.mozilla.org/show_bug.cgi?id=363813</a></li>
</ul>
<p>Tom Ferris reported a heap buffer overflow in SVG involving wide
stroke widths. This flaw was introduced in Firefox 2 and does not
affect earlier releases.</p>
<ul>
<li><a class="ex-ref" href="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0776">CVE-2007-0776</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=360645">
https://bugzilla.mozilla.org/show_bug.cgi?id=360645</a></li>
</ul>
<p>Brian Crowder, Igor Bukanov, Johnny Stenback, moz_bug_r_a4 and shutdown
reported potential memory corruption in the JavaScript engine</p>
<ul>
<li><a class="ex-ref" href="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0777">CVE-2007-0777</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=368534">
https://bugzilla.mozilla.org/show_bug.cgi?id=368534</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=362909">
https://bugzilla.mozilla.org/show_bug.cgi?id=362909</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=365527">
https://bugzilla.mozilla.org/show_bug.cgi?id=365527</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=365692">
https://bugzilla.mozilla.org/show_bug.cgi?id=365692</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=366601">
https://bugzilla.mozilla.org/show_bug.cgi?id=366601</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=364657">
https://bugzilla.mozilla.org/show_bug.cgi?id=364657</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=367118">
https://bugzilla.mozilla.org/show_bug.cgi?id=367118</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=367119">
https://bugzilla.mozilla.org/show_bug.cgi?id=367119</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=367120">
https://bugzilla.mozilla.org/show_bug.cgi?id=367120</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=367501">
https://bugzilla.mozilla.org/show_bug.cgi?id=367501</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=362872">
https://bugzilla.mozilla.org/show_bug.cgi?id=362872</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=364023">
https://bugzilla.mozilla.org/show_bug.cgi?id=364023</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=366122">
https://bugzilla.mozilla.org/show_bug.cgi?id=366122</a></li>
<li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=366123">
https://bugzilla.mozilla.org/show_bug.cgi?id=366123</a></li>
</ul>