An updated firefox package that fixes various security bugs is now
available for CentOS Linux 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Mozilla Firefox is an open source Web browser.
A bug was found in the way Firefox handled synthetic events. It is possible
that Web content could generate events such as keystrokes or mouse clicks
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2005-2260 to this issue.
is possible for a malicious webpage to leverage this vulnerability to
A bug was found in the way Firefox set an image as the desktop wallpaper.
If a user chooses the "Set As Wallpaper..." context menu item on a
specially crafted image, it is possible for an attacker to execute
arbitrary code on a victim's machine. (CAN-2005-2262)
A bug was found in the way Firefox installed its extensions. If a user can
be tricked into visiting a malicious webpage, it may be possible to obtain
sensitive information such as cookies or passwords. (CAN-2005-2263)
A bug was found in the way Firefox handled the _search target. It is
is possible for a malicious web page to crash the browser by executing
A bug was found in the way Firefox handled multiple frame domains. It is
possible for a frame as part of a malicious web site to inject content into
a frame that belongs to another domain. This issue was previously fixed as
CAN-2004-0718 but was accidentally disabled. (CAN-2005-1937)
A bug was found in the way Firefox handled child frames. It is possible for
a malicious framed page to steal sensitive information from its parent
A bug was found in the way Firefox opened URLs from media players. If a
with access to the currently open webpage. (CAN-2005-2267)
A design flaw was found in the way Firefox displayed alerts and prompts.
which prevented a user from knowing which site created them. (CAN-2005-2268)
A bug was found in the way Firefox handled DOM node names. It is possible
for a malicious site to overwrite a DOM node name, allowing certain
A bug was found in the way Firefox cloned base objects. It is possible for
Web content to navigate up the prototype chain to gain access to privileged
chrome objects. (CAN-2005-2270)
Users of Firefox are advised to upgrade to this updated package that
contains Firefox version 1.0.6 and is not vulnerable to these issues.