Bug 512128 (CVE-2009-2462)

Summary: CVE-2009-2462 Mozilla Browser engine crashes
Product: [Other] Security Response Reporter: Josh Bressers <bressers>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: jlieskov, mjc, security-response-team, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2462
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-04-12 15:57:32 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Josh Bressers 2009-07-16 13:58:15 UTC
Mozilla developers and community members identified and fixed several
stability bugs in the browser engine used in Firefox and other
Mozilla-based products. Some of these crashes showed evidence of memory
corruption under certain circumstances and we presume that with enough
effort at least some of these could be exploited to run arbitrary code.

Martijn Wargers, Arno Renevier, Jesse Ruderman, Olli Pettay and Blake
Kaplan reported crashes in the Firefox 3 browser engine.

Comment 2 errata-xmlrpc 2009-07-22 01:26:04 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 4

Via RHSA-2009:1162 https://rhn.redhat.com/errata/RHSA-2009-1162.html

Comment 3 errata-xmlrpc 2009-07-22 01:29:59 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3
  Red Hat Enterprise Linux 4

Via RHSA-2009:1163 https://rhn.redhat.com/errata/RHSA-2009-1163.html

Comment 4 Jan Lieskovsky 2009-07-22 18:40:44 UTC
MITRE's CVE-2009-2462 entry:

The browser engine in Mozilla Firefox before 3.0.12 and Thunderbird
allows remote attackers to cause a denial of service (memory
corruption and application crash) or possibly execute arbitrary code
via vectors related to (1) the frame chain and synchronous events, (2)
a SetMayHaveFrame assertion and
nsCSSFrameConstructor::CreateFloatingLetterFrame, (3)
nsCSSFrameConstructor::ConstructFrame, (4) the child list and initial
reflow, (5) GetLastSpecialSibling, (6)
nsFrameManager::GetPrimaryFrameFor and MathML, (7)
nsFrame::GetBoxAscent, (8) nsCSSFrameConstructor::AdjustParentFrame,
(9) nsDOMOfflineResourceList, and (10)
nsContentUtils::ComparePosition.

References:
----------
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2462
http://www.mozilla.org/security/announce/2009/mfsa2009-34.html
https://bugzilla.mozilla.org/show_bug.cgi?id=413085
https://bugzilla.mozilla.org/show_bug.cgi?id=442227
https://bugzilla.mozilla.org/show_bug.cgi?id=445177
https://bugzilla.mozilla.org/show_bug.cgi?id=461861
https://bugzilla.mozilla.org/show_bug.cgi?id=463350
https://bugzilla.mozilla.org/show_bug.cgi?id=466763
https://bugzilla.mozilla.org/show_bug.cgi?id=468211
https://bugzilla.mozilla.org/show_bug.cgi?id=472668
https://bugzilla.mozilla.org/show_bug.cgi?id=472950
https://bugzilla.mozilla.org/show_bug.cgi?id=491134
http://www.securityfocus.com/bid/35758
http://secunia.com/advisories/35914
http://secunia.com/advisories/35943
http://secunia.com/advisories/35944
http://secunia.com/advisories/35947
http://www.vupen.com/english/advisories/2009/1972

Comment 5 Fedora Update System 2009-07-23 19:13:20 UTC
devhelp-0.22-10.fc10, blam-1.8.5-12.fc10, gecko-sharp2-0.13-10.fc10, galeon-2.0.7-12.fc10, gnome-python2-extras-2.19.1-32.fc10, evolution-rss-0.1.2-8.fc10, gnome-web-photo-0.3-20.fc10, mozvoikko-0.9.5-12.fc10, google-gadgets-0.10.5-8.fc10, kazehakase-0.5.6-4.fc10.4, mugshot-1.2.2-11.fc10, yelp-2.24.0-11.fc10, ruby-gnome2-0.19.0-3.fc10.1, Miro-2.0.5-2.fc10, epiphany-2.24.3-8.fc10, pcmanx-gtk2-0.3.8-11.fc10, xulrunner-1.9.0.12-1.fc10, firefox-3.0.12-1.fc10 has been pushed to the Fedora 10 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 6 errata-xmlrpc 2010-03-17 12:39:18 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2010:0153 https://rhn.redhat.com/errata/RHSA-2010-0153.html

Comment 7 errata-xmlrpc 2010-03-17 13:25:39 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2010:0154 https://rhn.redhat.com/errata/RHSA-2010-0154.html