Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 87906 - www-client/netscape: Various Vulnerabilities
Summary: www-client/netscape: Various Vulnerabilities
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High enhancement (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/14821/
Whiteboard: ~2 [upstream+ removed] koon
Keywords:
: 87983 88430 89265 89728 (view as bug list)
Depends on:
Blocks:
 
Reported: 2005-04-04 07:03 UTC by Jean-François Brunette (RETIRED)
Modified: 2006-09-05 05:25 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
jsstr.c.patch (jsstr.c.patch,2.43 KB, patch)
2005-04-04 11:43 UTC, Christian Wolf
no flags Details | Diff
mozilla-firefox-1.0.2-r2.ebuild (mozilla-firefox-1.0.2-r2.ebuild,7.83 KB, text/plain)
2005-04-04 11:43 UTC, Christian Wolf
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Jean-François Brunette (RETIRED) gentoo-dev 2005-04-04 07:03:26 UTC
Description:
A vulnerability has been discovered in Mozilla Suite, which can be exploited by malicious people to gain knowledge of potentially sensitive information.

For more information:
SA14820

The vulnerability has been confirmed in version 1.7.6. Other versions may also be affected.

Solution:
Disable JavaScript support.

Other References:
SA14820:
http://secunia.com/advisories/14820/

--------------------------------------------

Description:
A vulnerability has been discovered in Mozilla Firefox, which can be exploited by malicious people to gain knowledge of potentially sensitive information.

The vulnerability is caused due to an error in the JavaScript engine, as a "lambda" replace exposes arbitrary amounts of heap memory after the end of a JavaScript string.

Successful exploitation may disclose sensitive information in memory.

Secunia has constructed a test, which can be used to check if your browser is affected by this issue:
http://secunia.com/mozilla_products_arbitrary_memory_exposure_test/

The vulnerability has been confirmed in versions 1.0.1 and 1.0.2. Other versions may also be affected.

Solution:
Disable JavaScript support.

Original Advisory:
Mozilla bug report:
https://bugzilla.mozilla.org/show_bug.cgi?id=288688
Comment 1 Luke Macken (RETIRED) gentoo-dev 2005-04-04 07:23:55 UTC
CC'ing mozilla herd.  
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2005-04-04 07:28:13 UTC
Upstream bug: 
https://bugzilla.mozilla.org/show_bug.cgi?id=288688

Will land in aviary-1.0.3 and seamonkey-1.7.7
Comment 3 Christian Wolf 2005-04-04 11:40:58 UTC
I've just rebuild FF 1.0.2 with the patch from Mozilla's Bugzilla. Patch applies cleanly after a little cosmetics
Should also work for Seamonkey, but I have not tested this.
Patch is only 5 lines or so after all...

Patch and ebuild for FF attached to this bug.

Why wait for 1.0.3 if we can fix this now?
Comment 4 Christian Wolf 2005-04-04 11:43:18 UTC
Created attachment 55289 [details, diff]
jsstr.c.patch
Comment 5 Christian Wolf 2005-04-04 11:43:52 UTC
Created attachment 55290 [details]
mozilla-firefox-1.0.2-r2.ebuild
Comment 6 Luke Macken (RETIRED) gentoo-dev 2005-04-04 18:15:07 UTC
*** Bug 87983 has been marked as a duplicate of this bug. ***
Comment 7 Jean-François Brunette (RETIRED) gentoo-dev 2005-04-05 06:02:46 UTC
Netscape 7.2 is also affected with the same vulnerability

(http://secunia.com/advisories/14804/)
Comment 8 Thierry Carrez (RETIRED) gentoo-dev 2005-04-05 10:31:29 UTC
About patching vs waiting for upstream, new versions are almost ready :
http://www.mozillazine.org/talkback.html?article=6336
So I think it's worth waiting.

Mozilla team: get ready for another bump !
Comment 9 Thierry Carrez (RETIRED) gentoo-dev 2005-04-09 04:07:22 UTC
*** Bug 88430 has been marked as a duplicate of this bug. ***
Comment 10 Luke Macken (RETIRED) gentoo-dev 2005-04-15 23:38:58 UTC
Mozilla has just released these updates.

(also, this is CAN-2005-0989)
Comment 11 Jakub Moc (RETIRED) gentoo-dev 2005-04-16 02:27:26 UTC
*** Bug 89265 has been marked as a duplicate of this bug. ***
Comment 12 Thierry Carrez (RETIRED) gentoo-dev 2005-04-16 03:51:10 UTC
So this bug is now splitted...
Please follow progress on mozilla-1.7.7 tracker bug (bug 89305) and mozilla-firefox 1.0.3 tracker bug (bug 89303).

This bug will deal with netscape vulnerability only.
Comment 13 Thierry Carrez (RETIRED) gentoo-dev 2005-04-18 09:03:38 UTC
There is no reason to see an update from Netscape and it must be riddled with other vulnerabilities, making it an unsafe browser to surf the web with. I think we should mask it...

usata: your feeling ?
Comment 14 Mamoru KOMACHI (RETIRED) gentoo-dev 2005-04-19 06:43:18 UTC
Agreed with masking www-clients/netscape until Netscape
releases fixed version. I'll mask it shortly.
Comment 15 Thierry Carrez (RETIRED) gentoo-dev 2005-04-20 03:02:47 UTC
Netscape 7.2 is also vulnerable to http://secunia.com/advisories/14996/
usata: please comment on the bug when masking is done.
Comment 16 Thierry Carrez (RETIRED) gentoo-dev 2005-04-20 03:03:24 UTC
*** Bug 89728 has been marked as a duplicate of this bug. ***
Comment 17 Mamoru KOMACHI (RETIRED) gentoo-dev 2005-04-20 04:41:40 UTC
I've just p.masked www-client/netscape. 
Comment 18 Thierry Carrez (RETIRED) gentoo-dev 2005-04-21 00:59:42 UTC
Out of global scope until a new Netscape release fixes this (or we get rid of that package)
Comment 19 Jean-François Brunette (RETIRED) gentoo-dev 2005-05-10 12:11:48 UTC
Netscape 7.2 is also vulnerable to http://secunia.com/advisories/15267/
Comment 20 Jean-François Brunette (RETIRED) gentoo-dev 2005-05-23 05:17:54 UTC
The version 8.0.1 has been released with fixes for:
Comment 21 Jean-François Brunette (RETIRED) gentoo-dev 2005-05-23 05:17:54 UTC
The version 8.0.1 has been released with fixes for:
 MFSA 2005-44 Privilege escalation via non-DOM property overrides
 MFSA 2005-43 "Wrapped" javascript: urls bypass security checks
 MFSA 2005-42 Code execution via javascript: IconURL
Comment 22 Thierry Carrez (RETIRED) gentoo-dev 2005-06-12 07:21:48 UTC
usata: Time to bump to 8.0.1...
Comment 23 Mamoru KOMACHI (RETIRED) gentoo-dev 2005-06-12 12:58:03 UTC
There is only Windows version of Netscape 8.x available atm.
Comment 24 Thierry Carrez (RETIRED) gentoo-dev 2005-06-12 13:47:33 UTC
Oops :)
Comment 25 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-03-22 12:42:22 UTC
Mamory any news on this one?
Comment 26 Tavis Ormandy (RETIRED) gentoo-dev 2006-03-22 13:41:20 UTC
suggest resolving this one CANTFIX
Comment 27 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-09-05 05:25:18 UTC
Seems like Netscape was completely removed since last I checked. Resoling this as FIXED.