CVE-2010-0162 – Mozilla bypass of same-origin policy due to improper SVG document processing (MFSA 2010-05)
https://notcve.org/view.php?id=CVE-2010-0162
Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly support the application/octet-stream content type as a protection mechanism against execution of web script in certain circumstances involving SVG and the EMBED element, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via an embedded SVG document. Mozilla Firefox v3.0.x anteriores v3.0.18 y v3.5.x anteriores v3.5.8, y SeaMonkey before v2.0.3, no soporta de forma adecuada el tipo de contenido application/octet-stream como mecanismo de protección contra la ejecución de ficheros de comandos web en ciertas circunstancias implicando elementos SVG y EMBED, lo que permite a atacantes remotos evitar la Same Origin Policy, y conducir ataques ejecución de secuencias de comandos en sitios cruzados (XSS) a través de documentos SVG embebidos. • http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035346.html http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035367.html http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035426.html http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00001.html http://secunia.com/advisories/37242 http://secunia.com/advisories/38847 http://www.debian.org/security/2010/dsa-1999 http://www.mandriva.com/security/advisories?name=MDVSA-2010:042 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2010-0160 – Mozilla Firefox Web Worker Array Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2010-0160
The Web Worker functionality in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly handle array data types for posted messages, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. La funcionalidad Web Worker en Mozilla Firefox v3.0.x anterior a la v3.0.18 y 3.5.x anterior a la v3.5.8, y SeaMonkey anteriores a la v2.0.3, no manejan de forma adecuada los tipos de datos array para mensajes posteado, lo que permite que atacantes remotos provoquen una denegación de servicio (corrupción de memoria dinámica y caída de la aplicación) o posiblemente ejecución de código de su elección a través de vectores no especificados. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists within the implementation of web worker threads. Due to mishandling the array data type while processing posted messages, a web worker thread can be made to corrupt heap memory. • http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035346.html http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035367.html http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035426.html http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00001.html http://secunia.com/advisories/37242 http://secunia.com/advisories/38847 http://www.debian.org/security/2010/dsa-1999 http://www.mandriva.com/security/advisories?name=MDVSA-2010:042 • CWE-399: Resource Management Errors •
CVE-2009-4630
https://notcve.org/view.php?id=CVE-2009-4630
Mozilla Necko, as used in Firefox, SeaMonkey, and other applications, performs DNS prefetching of domain names contained in links within local HTML documents, which makes it easier for remote attackers to determine the network location of the application's user by logging DNS requests. NOTE: the vendor disputes the significance of this issue, stating "I don't think we necessarily need to worry about that case." Mozilla Necko usado en Firefox, SeaMonkey y otras aplicaciones, realiza una pre-consulta sobre los nombres de dominio en enlaces dentro de los documentos HTML locales, lo que facilita a atacantes remotos el determinar la localización de red de las aplicaciones de usuario mediante peticiones de loggin DNS. NOTA: el fabricante cuestiona la importancia de esta cuestión, diciendo que "No cree necesario preocuparse por ese tema". • https://bugzilla.mozilla.org/show_bug.cgi?id=453403 https://bugzilla.mozilla.org/show_bug.cgi?id=492196 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2009-4629
https://notcve.org/view.php?id=CVE-2009-4629
Mozilla Necko, as used in Thunderbird 3.0.1, SeaMonkey, and other applications, performs DNS prefetching even when the app type is APP_TYPE_MAIL or APP_TYPE_EDITOR, which makes it easier for remote attackers to determine the network location of the application's user by logging DNS requests, as demonstrated by DNS requests triggered by reading text/plain e-mail messages in Thunderbird. Mozilla Necko usado en Thunderbird v3.0.1, SeaMonkey y otras aplicaciones, realiza una pre-consulta DNS incluso cuando el tipo de aplicación es APP_TYPE_MAIL o APP_TYPE_EDITOR, lo que facilita a atacantes remotos el determinar la localización de red de las aplicaciones de usuario mediante peticiones de loggin DNS, como se demostró mediante las peticiones DNS realizadas con la lectura de los correos en texto plano en Thunderbird. • https://bugzilla.mozilla.org/show_bug.cgi?id=492196 https://secure.grepular.com/DNS_Prefetch_Exposure_on_Thunderbird_and_Webmail • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2009-3987
https://notcve.org/view.php?id=CVE-2009-3987
The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, generates different exception messages depending on whether the referenced COM object is listed in the registry, which allows remote attackers to obtain potentially sensitive information about installed software by making multiple calls that specify the ProgID values of different COM objects. La función GeckoActiveXObject en Mozilla Firefox antes de v3.0.16 y v3.5.x antes de v3.5.6, y SeaMonkey antes de v2.0.1, genera mensajes de excepción diferentes dependiendo de si el objeto COM al que se hace referencia aparece en el registro, lo que permite obtener a atacantes remotos, información potencialmente confidencial sobre el software instalado. Esto se consigue haciendo multiples llamadas que especifican los valores de ProgID de diferentes objetos COM. • http://secunia.com/advisories/37699 http://secunia.com/advisories/37785 http://securitytracker.com/id?1023346 http://securitytracker.com/id?1023347 http://www.mozilla.org/security/announce/2009/mfsa2009-71.html http://www.securityfocus.com/bid/37349 http://www.securityfocus.com/bid/37360 http://www.vupen.com/english/advisories/2009/3547 https://bugzilla.mozilla.org/show_bug.cgi?id=503451 https://bugzilla.redhat.com/show_bug.cgi?id=546729 https://exchange.xforce.ibmcloud.com • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •