Bug 145599 - CAN-2005-0141 multiple mozilla issues (CAN-2005-0142 CAN-2005-0143 CAN-2005-0144 CAN-2004-1380 CAN-2004-1381 CAN-2005-0146 CAN-2005-0147 CAN-2005-0149)
Summary: CAN-2005-0141 multiple mozilla issues (CAN-2005-0142 CAN-2005-0143 CAN-2005-0...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: mozilla
Version: 3
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Christopher Aillon
QA Contact: Ben Levenson
URL:
Whiteboard: impact=moderate,public=20050120
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2005-01-20 01:06 UTC by Josh Bressers
Modified: 2007-11-30 22:10 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2005-04-28 20:34:20 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Mozilla Foundation 249332 0 None None None Never

Description Josh Bressers 2005-01-20 01:06:08 UTC
*** This bug has been split off bug 145597 ***

------- Original comment by Josh Bressers (Security Response Team) on 2005.01.19
19:57 -------

===================================
Mozilla Security Advisory MSA05-001
===================================

Title:      Link opened in new tab can load a local file
Severity:   Low
Reporter:   Jesse Ruderman

Fixed in:   Firefox 1.0
            Mozilla Suite 1.7.5


Description
-----------
Links with a custom getter and toString method can bypass checks
intended to prevent web content from linking to local files and "chrome"
URIs if the user can be convinced to middle-click (or control-click)
to open it in a new tab.

The browser's "same-origin" policy prevents the attacker's content from
taking advantage of this flaw to read the local file or manipulate
privileged chrome.


Workaround
----------
Turn off javascript or upgrade to fixed version


References
----------
https://bugzilla.mozilla.org/show_bug.cgi?id=249332

Comment 1 Josh Bressers 2005-01-20 01:07:49 UTC
This issue affects FC2.

Comment 2 Josh Bressers 2005-01-20 01:40:16 UTC
===================================
Mozilla Security Advisory MSA05-002
===================================

Title:      Opened attachments are temporarily saved world-readable
Severity:   Moderate (on a multiuser computer)
Reporter:   danielk

Fixed in:   Firefox 1.0
            Thunderbird 0.9
            Mozilla Suite 1.7.5

Vulnerable: Firefox 0.9
            Thunderbird 0.6
            Mozilla 1.7


Description
-----------
Mozilla software released after March 2004 saves some temporary files with
world-readable permissions. In the browser this is primarily
content fed to helper applications (for example, PDF files), and in
the mail clients it is attachments.


Workaround
----------
Do not open sensitive mail attachments on a shared multiuser machine.
Upgrade to fixed version


References
----------
https://bugzilla.mozilla.org/show_bug.cgi?id=251297


Comment 3 Josh Bressers 2005-01-20 01:46:46 UTC
===================================
Mozilla Security Advisory MSA05-003
===================================

Title:      Secure site lock can be spoofed with a binary download
Severity:   Low
Reporter:   Kylotan

Fixed in:   Firefox 1.0
            Mozilla Suite 1.7.5


Description 
----------- 
While on an insecure page triggering a load of a binary file from
a secure server will cause the SSL lock icon to appear. The certificate
information is that of the binary file's host, while the location bar URL
correctly shows the original insecure page.

This could potentially be abused by phishers to make their fake login sites
appear more authentic.


Workaround
----------
Upgrade to fixed version


References 
----------
https://bugzilla.mozilla.org/show_bug.cgi?id=257308

Comment 4 Josh Bressers 2005-01-20 01:53:37 UTC
===================================
Mozilla Security Advisory MSA05-004
===================================

Title:      Secure site lock can be spoofed with view-source:
Severity:   Low
Reporter:   Kohei Yoshino

Fixed in:   Firefox 1.0
            Mozilla Suite 1.7.5


Description
-----------
Kohei Yoshino reports the secure site lock icon can be spoofed by using
a view-source: URL targetted at the secure site whose credentials you want
to appropriate. An insecure page of the attackers choice can then be loaded
while the lock icon shows the previous secure state.
****
This could potentially be abused by phishers to make their fake login sites
appear more authentic.


Workaround
----------
Upgrade to fixed version


References
----------
https://bugzilla.mozilla.org/show_bug.cgi?id=262689

Comment 5 Josh Bressers 2005-01-20 02:02:06 UTC
===================================
Mozilla Security Advisory MSA05-005
===================================

Title:      Input stealing from other tabs
Severity:   High
Reporter:   Jakob Balle (Secunia)

Fixed in:   Firefox 1.0
            Mozilla Suite 1.7.5


Description
-----------
Jakob Balle of Secunia reported two vulnerabilities in windows with multiple
tabs. Malicious content in a background tab can attempt to steal information
intended for the topmost tab by popping up prompt dialog that appears to come
from the trusted site, or by silently redirecting input focus to a background
tab hoping to catch the user inputting something sensitive.

Jesse Ruderman and Martin Wargers discovered variants


Workaround
----------
Do not open sites with sensitive content in the same window as tabs from
untrusted content.
Upgrade to fixed version.


References
----------
http://secunia.com/advisories/12712
https://bugzilla.mozilla.org/show_bug.cgi?id=262887
https://bugzilla.mozilla.org/show_bug.cgi?id=265055
https://bugzilla.mozilla.org/show_bug.cgi?id=265456


Comment 6 Josh Bressers 2005-01-20 02:16:21 UTC
===================================
Mozilla Security Advisory MSA05-008
===================================

Title:      Synthetic middle-click event can steal clipboard contents
Severity:   Moderate
Reporter:   Jesse Ruderman

Fixed in:   Firebird 1.0
            Mozilla Suite 1.7.5


Description
-----------
Script-generated middle-click events can steal clipboard contents
on systems where that action is a paste. Middle-click paste is the
default behavior on Unix systems, and a hidden option elsewhere.


Workaround
----------
Disable javascript or upgrade to fixed version.


References
----------
https://bugzilla.mozilla.org/show_bug.cgi?id=265728

Comment 7 Josh Bressers 2005-01-20 02:21:27 UTC
===================================
Mozilla Security Advisory MSA05-009
===================================

Title:      Browser responds to proxy auth request from non-proxy server (ssl/https)
Severity:   High
Reporter:   Christopher Nebergall

Fixed in:   Firefox 1.0
            Mozilla Suite 1.7.5


Description
-----------
If a proxy is configured the browser would respond to a 407 proxy auth
request from any SSL-connected server rather than only responding to
the configured proxy server. This could leak NTLM or SPNEGO credentials
outside the organization.


Workaround
----------
Upgrade to the fixed version


References
----------
https://bugzilla.mozilla.org/show_bug.cgi?id=267263

Comment 8 Josh Bressers 2005-01-20 02:27:45 UTC
===================================
Mozilla Security Advisory MSA05-011
===================================

Title:      Mail responds to cookie requests
Severity:   High
Reporter:   Michiel van Leeuwen

Fixed in:   Thunderbird 1.0
            Mozilla Suite 1.7.5

Vulnerable: Thunderbird 0.6 - 0.9
            Mozilla Suite 1.7 - 1.7.3


Description
-----------
Mozilla mail clients from March to December 2004 responded to cookie
requests accompanying content loaded over HTTP, ignoring the setting
of the preference "network.cookie.disableCookieForMailNews" (disabled
cookies are the default in mail).

Cookies in mail (especially spam) could be used to track people.


Workaround
----------
Set the mail client not to load remote content at all (the default
setting in Thunderbird, the "View as Simple text" option in the Mozilla Suite).
Upgrade to the fixed version


References
----------
https://bugzilla.mozilla.org/show_bug.cgi?id=267263

Comment 9 Josh Bressers 2005-01-25 20:45:17 UTC
Lifting embargo.

Comment 10 Christopher Aillon 2005-04-28 20:34:20 UTC
Fixed in latest mozilla release version.


Note You need to log in before you can comment on or make changes to this bug.