Mozilla cookie远程拒绝服务攻击漏洞

admin 2022-07-12 12:04:09 CNNVD漏洞 来源:ZONE.CI 全球网 0 阅读模式

漏洞信息详情

Mozilla cookie远程拒绝服务攻击漏洞

  • CNNVD编号:CNNVD-200705-564
  • 危害等级: 低危
  • CVE编号: CVE-2007-1362
  • 漏洞类型: 输入验证
  • 发布时间: 2007-05-31
  • 威胁类型: 远程
  • 更新时间: 2007-10-03
  • 厂        商: mozilla
  • 漏洞来源: Boris ZbarskyEli F...

漏洞简介

Mozilla Firefox/SeaMonkey/Thunderbird都是Mozilla发布的WEB浏览器和邮件新闻组客户端产品。

Mozilla客户端处理cookie存在两个漏洞。第一个漏洞是没有对cookie路径参数执行任何长度检查,导致受害用户的浏览器可能在运行期间使用过多的内存,浪费过多的磁盘空间存储cookie直至过期。HTTP服务器所发送的Cookie应受HTTP头大小的合理限制,但通过Javascript所创建并使用document.cookie所添加的cookie可能拥有任意长度的路径,甚至为数十兆。

第二个漏洞是没有检查cookie路径和名称值中是否存在用于内部cookie存储的分隔符,如果存在的话可能导致之后解释cookie数据混乱,其中的一种异常是不安全的站点可能创建\"安全\"的cookie。

漏洞公告

临时解决方法:

* 在Thunderbird或SeaMonkey的邮件部分禁用Javascript

* 从"工具"菜单的"清除隐私数据"项中删除所存储的表单数据;必须在重启浏览器后在表单字段中输入任何内容之前立即完成以防在清除数据前触发挂起。

厂商补丁:

Debian

------

Debian已经为此发布了一个安全公告(DSA-1300-1)以及相应补丁:

DSA-1300-1:New iceape packages fix several vulnerabilities

链接:

http://www.debian.org/security/2007/dsa-1300" target="_blank">

http://www.debian.org/security/2007/dsa-1300

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.9-0etch1.dsc" target="_blank">

http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.9-0etch1.dsc

Size/MD5 checksum: 1403 fac51ae60382306a1f5937d393cad9b8

http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.9-0etch1.diff.gz" target="_blank">

http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.9-0etch1.diff.gz

Size/MD5 checksum: 265235 f0632d0ab1011723516b42ddc3fbf077

http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.9.orig.tar.gz" target="_blank">

http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.9.orig.tar.gz

Size/MD5 checksum: 42936008 f3f2409c45e5e48124159f71c3f305db

Architecture independent components:

http://security.debian.org/pool/updates/main/i/iceape/iceape-chatzilla_1.0.9-0etch1_all.deb" target="_blank">

http://security.debian.org/pool/updates/main/i/iceape/iceape-chatzilla_1.0.9-0etch1_all.deb

Size/MD5 checksum: 278514 abeb91d6d747fbd2a2dc4c53a0c1b730

http://security.debian.org/pool/updates/main/i/iceape/iceape-dev_1.0.9-0etch1_all.deb" target="_blank">

http://security.debian.org/pool/updates/main/i/iceape/iceape-dev_1.0.9-0etch1_all.deb

Size/MD5 checksum: 3655228 aeaa72117bdef3db570d175294003567

http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.9-0etch1_all.deb" target="_blank">

http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.9-0etch1_all.deb

Size/MD5 checksum: 27642 2c103331d2f75caab26dc5c5c5b53db5

http://security.debian.org/pool/updates/main/i/iceape/mozilla-browser_1.8+1.0.9-0etch1_all.deb" target="_blank">

http://security.debian.org/pool/updates/main/i/iceape/mozilla-browser_1.8+1.0.9-0etch1_all.deb

Size/MD5 checksum: 27172 6461173091e780104247676063370dd4

http://security.debian.org/pool/updates/main/i/iceape/mozilla-calendar_1.8+1.0.9-0etch1_all.deb" target="_blank">

http://security.debian.org/pool/updates/main/i/iceape/mozilla-calendar_1.8+1.0.9-0etch1_all.deb

Size/MD5 checksum: 26244 3a26fad0fccac9cb3f0a3826eaba0398

http://security.debian.org/pool/updates/main/i/iceape/mozilla-chatzilla_1.8+1.0.9-0etch1_all.deb" target="_blank">

http://security.debian.org/pool/updates/main/i/iceape/mozilla-chatzilla_1.8+1.0.9-0etch1_all.deb

Size/MD5 checksum: 26258 6c114441ed304d22a68626e641714a32

http://security.debian.org/pool/updates/main/i/iceape/mozilla-dev_1.8+1.0.9-0etch1_all.deb" target="_blank">

http://security.debian.org/pool/updates/main/i/iceape/mozilla-dev_1.8+1.0.9-0etch1_all.deb

Size/MD5 checksum: 26380 36e2977fd80cdf0e5132d3e5d3d7566f

http://security.debian.org/pool/updates/main/i/iceape/mozilla-dom-inspector_1.8+1.0.9-0etch1_all.deb" target="_blank">

http://security.debian.org/pool/updates/main/i/iceape/mozilla-dom-inspector_1.8+1.0.9-0etch1_all.deb

Size/MD5 checksum: 26280 4f803f93ba3146cf3568a8255d7ff1ce

http://security.debian.org/pool/updates/main/i/iceape/mozilla-js-debugger_1.8+1.0.9-0etch1_all.deb" target="_blank">

http://security.debian.org/pool/updates/main/i/iceape/mozilla-js-debugger_1.8+1.0.9-0etch1_all.deb

Size/MD5 checksum: 26276 fc04a5e05749f469061437aebce7e25c

http://security.debian.org/pool/updates/main/i/iceape/mozilla-mailnews_1.8+1.0.9-0etch1_all.deb" target="_blank">

http://secur

参考网址

来源: TA07-151A

名称: TA07-151A

链接:http://www.us-cert.gov/cas/techalerts/TA07-151A.HTML

来源: www.mozilla.org

链接:http://www.mozilla.org/security/announce/2007/mfsa2007-14.HTML

来源: issues.rpath.com

链接:https://issues.rpath.com/browse/RPL-1424

来源: XF

名称: mozilla-doccookie-dos(34613)

链接:http://xforce.iss.net/xforce/xfdb/34613

来源: UBUNTU

名称: USN-468-1

链接:http://www.ubuntu.com/usn/usn-468-1

来源: SECTRACK

名称: 1018163

链接:http://www.securitytracker.com/id?1018163

来源: SECTRACK

名称: 1018162

链接:http://www.securitytracker.com/id?1018162

来源: BID

名称: 24242

链接:http://www.securityfocus.com/bid/24242

来源: BID

名称: 22879

链接:http://www.securityfocus.com/bid/22879

来源: BUGTRAQ

名称: 20070531 FLEA-2007-0023-1: Firefox

链接:http://www.securityfocus.com/archive/1/archive/1/470172/100/200/threaded

来源: REDHAT

名称: RHSA-2007:0402

链接:http://www.redhat.com/support/errata/RHSA-2007-0402.HTML

来源: REDHAT

名称: RHSA-2007:0401

链接:http://www.redhat.com/support/errata/RHSA-2007-0401.HTML

来源: REDHAT

名称: RHSA-2007:0400

链接:http://www.redhat.com/support/errata/RHSA-2007-0400.HTML

来源: OSVDB

名称: 35139

链接:http://www.osvdb.org/35139

来源: SUSE

名称: SUSE-SA:2007:036

链接:http://www.novell.com/linux/security/advisories/2007_36_mozilla.HTML

来源: MANDRIVA

名称: MDKSA-2007:126

链接:http://www.mandriva.com/security/advisories?name=MDKSA-2007:126

来源: MANDRIVA

名称: MDKSA-2007:120

链接:http://www.mandriva.com/security/advisories?name=MDKSA-2007:120

来源: VUPEN

名称: ADV-2007-1994

链接:http://www.frsirt.com/english/advisories/2007/1994

来源: DEBIAN

名称: DSA-1308

链接:http://www.debian.org/security/2007/dsa-1308

来源: DEBIAN

名称: DSA-1306

链接:http://www.debian.org/security/2007/dsa-1306

来源: DEBIAN

名称: DSA-1300

链接:http://www.debian.org/security/2007/dsa-1300

来源: SLACKWARE

名称: SSA:2007-152-02

链接:http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.571857

来源: GENTOO

名称: GLSA-200706-06

链接:http://security.gentoo.org/glsa/glsa-200706-06.xml

来源: SECUNIA

名称: 25858

链接:http://secunia.com/advisories/25858

来源: SECUNIA

名称: 25750

链接:http://secunia.com/advisories/25750

来源: SECUNIA

名称: 25685

链接:http://secunia.com/advisories/25685

来源: SECUNIA

名称: 25647

链接:http://secunia.com/advisories/25647

来源: SECUNIA

名称: 25635

链接:http://secunia.com/advisories/25635

来源: SECUNIA

名称: 25559

链接:http://secunia.com/advisories/25559

来源: SECUNIA

名称: 25534

链接:http://secunia.com/advisories/25534

来源: SECUNIA

名称: 25533

链接:http://secunia.com/advisories/25533

来源: SECUNIA

名称: 25490

链接:http://secunia.com/advisories/25490

来源: SECUNIA

名称: 25476

链接:http://secunia.com/advisories/25476

来源: HP

名称: SSRT061181

链接:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742

受影响实体

  • Mozilla Firefox:2.0.0.3  
  • Mozilla Seamonkey:1.0.9  
  • Mozilla Seamonkey:1.1.2  
  • Mozilla Firefox:1.5.8  
  • Mozilla Firefox:2.0.0.2  

补丁

    暂无

weinxin
特别声明
本站(ZONE.CI)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
评论:0   参与:  0