Several vulnerabilities exist in the Mozilla Suite, which is no longer supported by the Mozilla project.
Package | www-client/mozilla on all architectures |
---|---|
Affected versions | <= 1.7.13 |
Unaffected versions |
Package | www-client/mozilla-bin on all architectures |
---|---|
Affected versions | <= 1.7.13 |
Unaffected versions |
The Mozilla Suite is a popular all-in-one web browser that includes a mail and news reader.
Several vulnerabilities ranging from code execution with elevated privileges to information leaks affect the Mozilla Suite.
A remote attacker could entice a user to browse to a specially crafted website or open a specially crafted mail that could trigger some of the vulnerabilities, potentially allowing execution of arbitrary code, denials of service, information leaks, or cross-site scripting attacks leading to the robbery of cookies of authentication credentials.
Most of the issues, but not all of them, can be prevented by disabling the HTML rendering in the mail client and JavaScript on every application.
The Mozilla Suite is no longer supported and has been masked after some necessary changes on all the other ebuilds which used to depend on it. Mozilla Suite users should unmerge www-client/mozilla or www-client/mozilla-bin, and switch to a supported product, like SeaMonkey, Thunderbird or Firefox.
# emerge --unmerge "www-client/mozilla" # emerge --unmerge "www-client/mozilla-bin"
Release date
March 03, 2007
Latest revision
March 03, 2007: 01
Severity
normal
Exploitable
remote
Bugzilla entries