-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-151A Mozilla Updates for Multiple Vulnerabilities Original release date: May 31, 2007 Last revised: -- Source: US-CERT Systems Affected * Mozilla Firefox * Mozilla Thunderbird * Mozilla SeaMonkey * Netscape Browser Other products based on Mozilla components may also be affected. Overview The Mozilla web browser and derived products contain several vulnerabilities, the most severe of which could allow a remote attacker to execute arbitrary code on an affected system. I. Description Mozilla has released new versions of Firefox, Thunderbird, and SeaMonkey to address several vulnerabilities. Further details about these vulnerabilities are available from Mozilla and the Vulnerability Notes Database. An attacker could exploit these vulnerabilities by convincing a user to view a specially-crafted HTML document, such as a web page or an HTML email message. Support for Firefox 1.5 is scheduled to end in June 2007. According to Mozilla: Firefox 1.5.0.x will be maintained with security and stability updates until June 2007. All users are strongly encouraged to upgrade to Firefox 2. II. Impact While the impacts of the individual vulnerabilities vary, the most severe could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. An attacker may also be able to cause a denial of service. III. Solution Upgrade These vulnerabilities are addressed in Mozilla Firefox 2.0.0.4, Firefox 1.5.0.12, Thunderbird 2.0.0.4, Thunderbird 1.5.0.12, SeaMonkey 1.0.9, SeaMonkey 1.1.2. By default, Mozilla Firefox, Thunderbird, and SeaMonkey automatically check for updates. IV. References * US-CERT Vulnerability Notes - <http://www.kb.cert.org/vuls/byid?searchview&query=mozilla_20070531> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/browser_security.html#Mozilla_Firefox> * Mozilla Foundation Security Advisories - <http://www.mozilla.org/security/announce/> * Known Vulnerabilities in Mozilla Products - <http://www.mozilla.org/projects/security/known-vulnerabilities.html> * Mozilla Hall of Fame - <http://www.mozilla.org/university/HOF.html> * Site Controls - <http://browser.netscape.com/ns8/help/options-site.jsp> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA07-151A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@xxxxxxxx> with "TA07-151A Feedback VU#751636" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History May 31, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRl8hMuxOF3G+ig+rAQLIagf/S2DvesVDq/ZeL4vm68xSSniQYCETBYOe fIIluxwNULN0HS3Z6Nyy2B9se0Z9SkIVPEg166nYTMdH3N7DHDJxFVJCwkiUJjV+ EnY4KWg1q/VWJKqislLRCGSV5LbaSkCiHeet228RmpRUlAeoNxkKfdfPdnGP+iTq DVl/fOtDipYLBIRgFpvsqj+iQjWQxScU3LB8pDKSstXKBOUDmxyWTsmYAN1bL4d9 CWuzCYcO7LJl4tyY2nmz+lgCCFVqlu89AWSPD8VNRc4f3V1whDxlHMV83V17jMDx 6F8+3pgmp8GVxf54CgiXegFr67qN2KNxrlzZf0o8jxl9bF83zV0+TQ== =m76L -----END PGP SIGNATURE-----