- ---------------------------------------------------------------------                   Red Hat Security Advisory

Synopsis:          Critical: firefox security update
Advisory ID:       RHSA-2006:0610-01
Advisory URL:      https://access.redhat.com/errata/RHSA-2006:0610.html
Issue date:        2006-07-28
Updated on:        2006-07-28
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-2779 CVE-2006-2780 CVE-2006-2783 
                   CVE-2006-2782 CVE-2006-2778 CVE-2006-2776 
                   CVE-2006-2784 CVE-2006-2785 CVE-2006-2786 
                   CVE-2006-2787 CVE-2006-2788 CVE-2006-3801 
                   CVE-2006-3677 CVE-2006-3113 CVE-2006-3802 
                   CVE-2006-3803 CVE-2006-3805 CVE-2006-3806 
                   CVE-2006-3807 CVE-2006-3808 CVE-2006-3809 
                   CVE-2006-3810 CVE-2006-3811 CVE-2006-3812 
- ---------------------------------------------------------------------1. Summary:

Updated firefox packages that fix several security bugs are now available
for Red Hat Enterprise Linux 4.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Mozilla Firefox is an open source Web browser.

The Mozilla Foundation has discontinued support for the Mozilla Firefox
1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in
Red Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox
1.5 branch.

This update also resolves a number of outstanding Firefox security issues:

Several flaws were found in the way Firefox processed certain javascript
actions. A malicious web page could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-2776,
CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,
CVE-2006-3812)

Several denial of service flaws were found in the way Firefox processed
certain web content. A malicious web page could crash the browser or
possibly execute arbitrary code as the user running Firefox.
(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,
CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)

A cross-site scripting flaw was found in the way Firefox processed
Unicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web
page could execute a script within the browser that a web input sanitizer
could miss due to a malformed "script" tag. (CVE-2006-2783)

Several flaws were found in the way Firefox processed certain javascript
actions. A malicious web page could conduct a cross-site scripting attack
or steal sensitive information (such as cookies owned by other domains).
(CVE-2006-3802, CVE-2006-3810)

A form file upload flaw was found in the way Firefox handled javascript
input object mutation. A malicious web page could upload an arbitrary local
file at form submission time without user interaction. (CVE-2006-2782)

A denial of service flaw was found in the way Firefox called the
crypto.signText() javascript function. A malicious web page could crash the
browser if the victim had a client certificate loaded. (CVE-2006-2778)

Two HTTP response smuggling flaws were found in the way Firefox processed
certain invalid HTTP response headers. A malicious web site could return
specially crafted HTTP response headers which may bypass HTTP proxy
restrictions. (CVE-2006-2786)

A flaw was found in the way Firefox processed Proxy AutoConfig scripts. A
malicious Proxy AutoConfig server could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-3808)

A double free flaw was found in the way the nsIX509::getRawDER method was
called. If a victim visited a carefully crafted web page, it was possible
to execute arbitrary code as the user running Firefox. (CVE-2006-2788)

Users of Firefox are advised to upgrade to this update, which contains
Firefox version 1.5.0.5 that corrects these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

193895 - CVE-2006-2779 multiple firefox DoS issues (CVE-2006-2780)
196973 - CVE-2006-2783 multiple Firefox issues (CVE-2006-2782,CVE-2006-2778,CVE-2006-2776,CVE-2006-2784,CVE-2006-2785,CVE-2006-2786,CVE-2006-2787,CVE-2006-2788)
200168 - CVE-2006-3801 Multiple Seamonkey issues (CVE-2006-3677, CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812)

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
6b7faea0461d07518bd00000001a4bbe  firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a  firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907  firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

ia64:
29ae3f60c50462267765855063edddf4  firefox-1.5.0.5-0.el4.1.ia64.rpm
a2e18536c14f09611d49276b9af8ffa8  firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm

ppc:
27c343290fd4c6fcf16323cd62f02e9b  firefox-1.5.0.5-0.el4.1.ppc.rpm
be5c0e93af729117a3c7153e58d50183  firefox-debuginfo-1.5.0.5-0.el4.1.ppc.rpm

s390:
4be9436cc0d3cb1daee6f6962fb894ec  firefox-1.5.0.5-0.el4.1.s390.rpm
4348ba2ef6e30a3e01137492373b6b11  firefox-debuginfo-1.5.0.5-0.el4.1.s390.rpm

s390x:
ddbb5e0ae4707724e08422de346aaedf  firefox-1.5.0.5-0.el4.1.s390x.rpm
db4a001815e2c6096122248ae9a22a4b  firefox-debuginfo-1.5.0.5-0.el4.1.s390x.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b  firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf  firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
6b7faea0461d07518bd00000001a4bbe  firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a  firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907  firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b  firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf  firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
6b7faea0461d07518bd00000001a4bbe  firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a  firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907  firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

ia64:
29ae3f60c50462267765855063edddf4  firefox-1.5.0.5-0.el4.1.ia64.rpm
a2e18536c14f09611d49276b9af8ffa8  firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b  firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf  firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
6b7faea0461d07518bd00000001a4bbe  firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a  firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907  firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

ia64:
29ae3f60c50462267765855063edddf4  firefox-1.5.0.5-0.el4.1.ia64.rpm
a2e18536c14f09611d49276b9af8ffa8  firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b  firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf  firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812
http://www.redhat.com/security/updates/classification/#critical

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.

RedHat: Critical: firefox security update RHSA-2006:0610-01

Updated firefox packages that fix several security bugs are now available for Red Hat Enterprise Linux 4

Summary



Summary

Mozilla Firefox is an open source Web browser. The Mozilla Foundation has discontinued support for the Mozilla Firefox 1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox 1.5 branch. This update also resolves a number of outstanding Firefox security issues: Several flaws were found in the way Firefox processed certain javascript actions. A malicious web page could execute arbitrary javascript instructions with the permissions of "chrome", allowing the page to steal sensitive information or install browser malware. (CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809, CVE-2006-3812) Several denial of service flaws were found in the way Firefox processed certain web content. A malicious web page could crash the browser or possibly execute arbitrary code as the user running Firefox. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811) A cross-site scripting flaw was found in the way Firefox processed Unicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web page could execute a script within the browser that a web input sanitizer could miss due to a malformed "script" tag. (CVE-2006-2783) Several flaws were found in the way Firefox processed certain javascript actions. A malicious web page could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810) A form file upload flaw was found in the way Firefox handled javascript input object mutation. A malicious web page could upload an arbitrary local file at form submission time without user interaction. (CVE-2006-2782) A denial of service flaw was found in the way Firefox called the crypto.signText() javascript function. A malicious web page could crash the browser if the victim had a client certificate loaded. (CVE-2006-2778) Two HTTP response smuggling flaws were found in the way Firefox processed certain invalid HTTP response headers. A malicious web site could return specially crafted HTTP response headers which may bypass HTTP proxy restrictions. (CVE-2006-2786) A flaw was found in the way Firefox processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary javascript instructions with the permissions of "chrome", allowing the page to steal sensitive information or install browser malware. (CVE-2006-3808) A double free flaw was found in the way the nsIX509::getRawDER method was called. If a victim visited a carefully crafted web page, it was possible to execute arbitrary code as the user running Firefox. (CVE-2006-2788) Users of Firefox are advised to upgrade to this update, which contains Firefox version 1.5.0.5 that corrects these issues.


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
193895 - CVE-2006-2779 multiple firefox DoS issues (CVE-2006-2780) 196973 - CVE-2006-2783 multiple Firefox issues (CVE-2006-2782,CVE-2006-2778,CVE-2006-2776,CVE-2006-2784,CVE-2006-2785,CVE-2006-2786,CVE-2006-2787,CVE-2006-2788) 200168 - CVE-2006-3801 Multiple Seamonkey issues (CVE-2006-3677, CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812)
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS: 6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm
i386: 93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm 15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm
ia64: 29ae3f60c50462267765855063edddf4 firefox-1.5.0.5-0.el4.1.ia64.rpm a2e18536c14f09611d49276b9af8ffa8 firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm
ppc: 27c343290fd4c6fcf16323cd62f02e9b firefox-1.5.0.5-0.el4.1.ppc.rpm be5c0e93af729117a3c7153e58d50183 firefox-debuginfo-1.5.0.5-0.el4.1.ppc.rpm
s390: 4be9436cc0d3cb1daee6f6962fb894ec firefox-1.5.0.5-0.el4.1.s390.rpm 4348ba2ef6e30a3e01137492373b6b11 firefox-debuginfo-1.5.0.5-0.el4.1.s390.rpm
s390x: ddbb5e0ae4707724e08422de346aaedf firefox-1.5.0.5-0.el4.1.s390x.rpm db4a001815e2c6096122248ae9a22a4b firefox-debuginfo-1.5.0.5-0.el4.1.s390x.rpm
x86_64: d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: 6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm
i386: 93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm 15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm
x86_64: d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: 6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm
i386: 93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm 15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm
ia64: 29ae3f60c50462267765855063edddf4 firefox-1.5.0.5-0.el4.1.ia64.rpm a2e18536c14f09611d49276b9af8ffa8 firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm
x86_64: d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: 6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm
i386: 93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm 15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm
ia64: 29ae3f60c50462267765855063edddf4 firefox-1.5.0.5-0.el4.1.ia64.rpm a2e18536c14f09611d49276b9af8ffa8 firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm
x86_64: d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2788 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812 http://www.redhat.com/security/updates/classification/#critical

Package List


Severity
Advisory ID: RHSA-2006:0610-01
Advisory URL: https://access.redhat.com/errata/RHSA-2006:0610.html
Issued Date: : 2006-07-28
Updated on: 2006-07-28
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-2779 CVE-2006-2780 CVE-2006-2783 CVE-2006-2782 CVE-2006-2778 CVE-2006-2776 CVE-2006-2784 CVE-2006-2785 CVE-2006-2786 CVE-2006-2787 CVE-2006-2788 CVE-2006-3801 CVE-2006-3677 CVE-2006-3113 CVE-2006-3802 CVE-2006-3803 CVE-2006-3805 CVE-2006-3806 CVE-2006-3807 CVE-2006-3808 CVE-2006-3809 CVE-2006-3810 CVE-2006-3811 CVE-2006-3812 Updated firefox packages that fix several security bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team.

Topic


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64

Red Hat Enterprise Linux Desktop version 4 - i386, x86_64

Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64

Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64


Bugs Fixed


Related News