Package : mozilla Vulnerability : several Problem type : remote Debian-specific: no CVE IDs : CVE-2006-6497 CVE-2006-6498 CVE-2006-6499 CVE-2006-6501 CVE-2006-6502 CVE-2006-6503 CVE-2006-6505 CERT advisories: VU#263412 VU#405092 VU#427972 VU#428500 VU#447772 VU#606260 VU#887332 BugTraq ID : 21668
Several security related problems have been discovered in Mozilla and derived products. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities:
CVE-2006-6497
Several vulnerabilities in the layout engine allow remote attackers to cause a denial of service and possibly permit them to execute arbitrary code. [MFSA 2006-68]
CVE-2006-6498
Several vulnerabilities in the JavaScript engine allow remote attackers to cause a denial of service and possibly permit them to execute arbitrary code. [MFSA 2006-68]
CVE-2006-6499
A bug in the js_dtoa function allows remote attackers to cause a denial of service. [MFSA 2006-68]
CVE-2006-6501
"shutdown" discovered a vulnerability that allows remote attackers to gain privileges and install malicious code via the watch JavaScript function. [MFSA 2006-70]
CVE-2006-6502
Steven Michaud discovered a programming bug that allows remote attackers to cause a denial of service. [MFSA 2006-71]
CVE-2006-6503
"moz_bug_r_a4" reported that the src attribute of an IMG element could be used to inject JavaScript code. [MFSA 2006-72]
CVE-2006-6505
Georgi Guninski discovered several heap-based buffer overflows that allow remote attackers to execute arbitrary code. [MFSA 2006-74]
For the stable distribution (sarge) these problems have been fixed in version 1.7.8-1sarge10.
For the unstable distribution (sid) these problems have been fixed in version 1.0.7-1 of iceape.
We recommend that you upgrade your Mozilla and Iceape packages.
Upgrade Instructions - --------------------
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge - --------------------------------