Firefox 1.0.4 - exact download link with a report

What is your faourite browser?

  • Firefox 1.0.4

    Votes: 0 0.0%
  • IE 6 SP-2

    Votes: 0 0.0%
  • Netscape 8

    Votes: 0 0.0%
  • (Not listed)

    Votes: 0 0.0%

  • Total voters
    307
Status
Not open for further replies.

hcp006sl

Journeyman
Though there are several threads on Firefox, I am introducing a new one on only the latest version of it.
Code:
*205.188.221.241/pub/mozilla.org/firefox/releases/1.0.4/win32/en-US/Firefox%20Setup%201.0.4.exe

What's new:

Title: Privilege escalation via non-DOM property overrides

Severity: Critical

Reporter: moz_bug_r_a4

Fixed in: Firefox 1.0.4

Description:
Additional checks were added to make sure Javascript eval and Script objects are run with the privileges of the context that created them, not the potentially elevated privilege of the context calling them in order to protect against an additional variant of MFSA 2005-41.

Workaround: Upgrade to Firefox 1.0.4.

References: Bug and exploit details withheld until May 18, 2005
*bugzilla.mozilla.org/show_bug.cgi?id=290908


Title: "Wrapped" javascript: urls bypass security checks

Severity: Critical

Reporter: Michael Krax, Georgi Guninski, L. David Baron

Fixed in: Firefox 1.0.4

Description:
Some security checks intended to prevent script injection were incorrect and could be bypassed by wrapping a javascript: url in the view-source: pseudo-protocol. Michael Krax demonstrated that a variant of his favicon exploit could still execute arbitrary code, and the same technique could also be used to perform cross-site scripting.

Georgi Guninski demonstrated the same flaw wrapping javascript: urls with the jar: pseudo-protocol.

L. David Baron discovered a nested variant that defeated checks in the script security manager.

Workaround: Disable Javascript

References: Bug and exploit details withheld until May 18, 2005

*bugzilla.mozilla.org/show_bug.cgi?id=290949
*bugzilla.mozilla.org/show_bug.cgi?id=290982
*bugzilla.mozilla.org/show_bug.cgi?id=291150
*bugzilla.mozilla.org/show_bug.cgi?id=293671


Title: Code execution via javascript: IconURL

Severity: Critical

Reporter: Paul (Greyhats)

Fixed in: Firefox 1.0.4

Description:
Two vulnerabilities found in Mozilla Firefox 1.0.3 when combined allow an attacker to run arbitrary code.

A vulnerability in the Firefox install confirmation dialog allows an attacker to supply a javascript: URL as the IconURL property, which will execute code. By using an eval() call in that URL arbitrary code can be executed with elevated privilege. By default only the Mozilla Update site is allowed to attempt software installation but users can allow other sites.

A second flaw in Firefox 1.0.3 allows an attacker to inject script into any site by loading it in a frame and navigating back to a previous javascript: URL containing an eval() call. This can be used to steal cookies or other confidential data from the target site. If the target site is allowed to raise the install confirmation dialog in Firefox then this attack can be combined with the first to execute arbitrary code.

The default Mozilla Update site has been modified to prevent its use in this attack.

Workaround: Changes were made to the default Mozilla Update site to protect users from these attacks shortly after this attack became public. Users who have added other extension or theme sites to the software installation whitelist should remove them until they have upgraded to a fixed version of Firefox.
Select the "Options" dialog from the "Tools" menu
Select the "Web Features" icon
Click the "Allowed Sites" button on the same line as the "Allow web sites to install software" checkbox
Click the "Remove All Sites" button
Click "OK"

Disabling Javascript will prevent both attacks.

References: Bug and exploit details withheld until May 18, 2005

*bugzilla.mozilla.org/show_bug.cgi?id=292691
*bugzilla.mozilla.org/show_bug.cgi?id=292499
*bugzilla.mozilla.org/show_bug.cgi?id=291745



You can also read story from BBC NEWS Published: 2005/05/12 16:01:21 GMT.
© BBC MMV
 

icecoolz

Cyborg Agent
theres already a running thread on 1.0.4 release. Post it there please.

*www.thinkdigit.com/forum/viewtopic.php?t=15269

Reporting this.
 
Status
Not open for further replies.
Top Bottom