These issues will remain unfixed in Firefox until we upgrade to Firefox 1.5. They are not additional issues, simply problems which are fixed as part of the upgrade. CVE-2006-2777 MFSA 2006-43 CVE-2006-2776 MFSA 2006-37 CVE-2006-2784 MFSA 2006-36 CVE-2006-2785 MFSA 2006-34 CVE-2006-2787 MFSA 2006-31 Several flaws were found in the way Firefox processes certain javascript actions. A malicious web page could execute arbitrary javascript instructions with the permissions of "chrome", allowing the page to steal sensitive information or install browser malware. CVE-2006-2783 MFSA 2006-42 A cross site scripting flaw was found in the way Firefox processes Unicode Byte-order-Mark (BOM) markers in UTF-8 web pages. A malicious web page could execute a script within the browser that a web input sanitizer could miss due to a malformed "script" tag. CVE-2006-2782 MFSA 2006-41 A form file upload flaw was found in the way Firefox handles javascript input object mutation. A malicious web page could upload an arbitrary local file at form submission time without user interaction. CVE-2006-2778 MFSA 2006-38 A denial of service flaw was found in the way Firefox calls the crypto.signText() javascript function. A malicious web page could crash the browser if the victim had a client certificate loaded. CVE-2006-2786 MFSA 2006-33 Two HTTP response smuggling flaws were found in the way Firefox processes certain invalid HTTP response headers. A malicious web site could return specially crafted HTTP response headers which may bypass HTTP proxy restrictions. CVE-2006-2788 A double free flaw was found in the way the nsIX509::getRawDER method is called. If a victim visits a carefully crafted web page it is possible to execute arbitrary code as the user running Mozilla. (CVE-2006-2788)
CVE-2006-2777 is now covered by bug 198934
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2006-0610.html