Vulnerabilities in Mozilla Firefox allow privilege escalations for JavaScript code, cross site scripting attacks, HTTP response smuggling and possibly the execution of arbitrary code.
Package | www-client/mozilla-firefox on all architectures |
---|---|
Affected versions | < 1.5.0.4 |
Unaffected versions | >= 1.5.0.4 |
Package | www-client/mozilla-firefox-bin on all architectures |
---|---|
Affected versions | < 1.5.0.4 |
Unaffected versions | >= 1.5.0.4 |
Mozilla Firefox is the next-generation web browser from the Mozilla project.
A number of vulnerabilities were found and fixed in Mozilla Firefox. For details please consult the references below.
By enticing the user to visit a malicious website, a remote attacker can inject arbitrary HTML and JavaScript Code into the user's browser, execute JavaScript code with elevated privileges and possibly execute arbitrary code with the permissions of the user running the application.
There is no known workaround at this time.
All Mozilla Firefox users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.4"
All Mozilla Firefox binary users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.4"
Note: There is no stable fixed version for the Alpha architecture yet. Users of Mozilla Firefox on Alpha should consider unmerging it until such a version is available.
Release date
June 11, 2006
Latest revision
June 11, 2006: 01
Severity
normal
Exploitable
remote
Bugzilla entries