Developers fix security vulnerabilities in Mozilla software
The developers at Mozilla have fixed numerous security vulnerabilities in the open-source programs Firefox, Thunderbird and Seamonkey. The vulnerabilities allowed attackers to inject malicious code, execute cross-site scripting attacks or overlay parts of the application window with foreign content.
The login data for mail servers in Thunderbird, which was protected by the encrypted APOP authentication, could be more easily cracked since the program did not follow the protocol strictly enough. Elements in the description language for the optics and the layout of the Mozilla programs XUL could be placed by attackers in such a manner, that these areas would lie outside of the actual content display, for example, over the address bar in the browser.
In addition, the Mozilla developers have upgraded a missing length check for path data for cookies. This allowed attackers to occupy large quantities of memory and possibly trigger a denial-of-service attack. As a result of a missing check on the internally used separators between the values for the cookie path and the field names, it was feasible that seized, non-secure Web servers could mistakenly write secure cookies.
The faults affect the program versions prior to the currently released versions Firefox 184.108.40.206 and 220.127.116.11, Thunderbird 18.104.22.168 and 22.214.171.124 as well as Seamonkey 1.1.2 and 1.0.9. Since attackers can possibly smuggle in malicious code in the previous versions, Mozilla users should update as soon as possible. An automatic update is already available for Firefox, and the automatic updates for Thunderbird and Seamonkey should be available in the near future.
Firefox 126.96.36.199 is supposed to be the last supported version in the 1.5 series. The developers want to provide an automatic update on version 2 of the browser "in a few weeks".
- Known Vulnerabilities in Mozilla Products, list of the closed security vulnerabilities from Mozilla developers
- Crashes with evidence of memory corruption, error report from Mozilla developers
- XSS using addEventListener, security report from Mozilla developers
- Security Vulnerability in APOP Authentication, error report from Mozilla developers
- Path Abuse in Cookies, error report from Mozilla developers
- XUL Popup Spoofing, security report from Mozilla developers