Mandrake Linux Security Advisory : mozilla (MDKSA-2004:021)

high Nessus Plugin ID 14120

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

A number of vulnerabilities were discovered in Mozilla 1.4 :

A malicious website could gain access to a user's authentication credentials to a proxy server.

Script.prototype.freeze/thaw could allow an attacker to run arbitrary code on your computer.

A vulnerability was also discovered in the NSS security suite which ships with Mozilla. The S/MIME implementation would allow remote attackers to cause a Denial of Service and possibly execute arbitrary code via an S/MIME email message containing certain unexpected ASN.1 constructs, which was demonstrated using the NISCC test suite. NSS version 3.9 corrects these problems and has been included in this package (which shipped with NSS 3.8).

Finally, Corsaire discovered that a number of HTTP user agents contained a flaw in how they handle cookies. This flaw could allow an attacker to avoid the path restrictions specified by a cookie's originator. According to their advisory :

'The cookie specifications detail a path argument that can be used to restrict the areas of a host that will be exposed to a cookie. By using standard traversal techniques this functionality can be subverted, potentially exposing the cookie to scrutiny and use in further attacks.'

As well, a bug with Mozilla and Finnish keyboards has been corrected.

The updated packages are patched to correct these vulnerabilities.

Solution

Update the affected packages.

See Also

https://bugzilla.mozilla.org/show_bug.cgi?id=213012

https://bugzilla.mozilla.org/show_bug.cgi?id=220122

https://bugzilla.mozilla.org/show_bug.cgi?id=221526

http://www.uniras.gov.uk/vuls/2003/006489/smime.htm

Plugin Details

Severity: High

ID: 14120

File Name: mandrake_MDKSA-2004-021.nasl

Version: 1.20

Type: local

Published: 7/31/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64nspr4, p-cpe:/a:mandriva:linux:lib64nspr4-devel, p-cpe:/a:mandriva:linux:lib64nss3, p-cpe:/a:mandriva:linux:lib64nss3-devel, p-cpe:/a:mandriva:linux:libnspr4, p-cpe:/a:mandriva:linux:mozilla-enigmime, p-cpe:/a:mandriva:linux:mozilla-irc, p-cpe:/a:mandriva:linux:mozilla-js-debugger, p-cpe:/a:mandriva:linux:mozilla-mail, p-cpe:/a:mandriva:linux:mozilla-spellchecker, cpe:/o:mandrakesoft:mandrake_linux:9.2, p-cpe:/a:mandriva:linux:libnspr4-devel, p-cpe:/a:mandriva:linux:libnss3, p-cpe:/a:mandriva:linux:libnss3-devel, p-cpe:/a:mandriva:linux:mozilla, p-cpe:/a:mandriva:linux:mozilla-devel, p-cpe:/a:mandriva:linux:mozilla-dom-inspector, p-cpe:/a:mandriva:linux:mozilla-enigmail

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 3/10/2004

Reference Information

CVE: CVE-2003-0564, CVE-2003-0594, CVE-2003-0791

CERT: 428230

MDKSA: 2004:021