On Tuesday, December 20, updates were issued for Firefox, Thunderbird and SeaMonkey to address security vulnerabilities. For those of you that have customers who use these products, please have them update to version 9.0 (and version 2.6 for SeaMonkey)
Currently I don’t see version 9 of Thunderbird available for downloading at this time – I expect the web page will be updated shortly.
http://www.mozilla.org/en-US/firefox/all.html – All language versions available at this link.
http://www.mozilla.org/en-US/thunderbird/all.html – All language versions available at this link.
http://www.seamonkey-project.org/releases/seamonkey2.6/ –
Additional details.
http://secunia.com/advisories/47302/
Criticality level Highly critical
Impact Unknown
Exposure of sensitive information
System access
Where From remote
Software:
Mozilla Firefox 8.x
Mozilla Thunderbird 8.x
Description
Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird, where one has an unknown impact and others can be exploited by malicious people to disclose sensitive information and compromise a user’s system.
1) Some unspecified errors can be exploited to corrupt memory. No further information is currently available.
2) An error exists within the YARR regular expression library when parsing javascript content.
3) An error within the SVG implementation when SVG elements are removed during a DOMAttrModified event can be exploited to cause an out-of-bounds memory access.
4) The application does not properly handle SVG animation accessKey events when JavaScript is disabled. This can lead to the user’s key strokes being leaked.
5) An error within the plugin handler when deleting DOM frame can be exploited to dereference memory.
NOTE: This vulnerability only affects Mac OS X.
6) An error exists within the handling of OGG <video> elements.
Successful exploitation of vulnerabilities #1 – #3 and #5 may allow execution of arbitrary code.
Solution
Upgrade to version 9.0.