Description: | Description: The remote host is missing an update to xulrunner-1.9 announced via advisory USN-717-1.
Details follow:
Several flaws were discovered in the browser engine. These problems could allow an attacker to crash the browser and possibly execute arbitrary code with user privileges. (CVE-2009-0352, CVE-2009-0353)
A flaw was discovered in the JavaScript engine. An attacker could bypass the same-origin policy in Firefox by utilizing a chrome XBL method and execute arbitrary JavaScript within the context of another website. (CVE-2009-0354)
A flaw was discovered in the browser engine when restoring closed tabs. If a user were tricked into restoring a tab to a malicious website with form input controls, an attacker could steal local files on the user's system. (CVE-2009-0355)
Wladimir Palant discovered that Firefox did not restrict access to cookies in HTTP response headers. If a user were tricked into opening a malicious web page, a remote attacker could view sensitive information. (CVE-2009-0357)
Paul Nel discovered that Firefox did not honor certain Cache-Control HTTP directives. A local attacker could exploit this to view private data in improperly cached pages of another user. (CVE-2009-0358)
Solution: The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 8.04 LTS: firefox-3.0 3.0.6+nobinonly-0ubuntu0.8.04.1 xulrunner-1.9 1.9.0.6+nobinonly-0ubuntu0.8.04.1
Ubuntu 8.10: abrowser 3.0.6+nobinonly-0ubuntu0.8.10.1 firefox-3.0 3.0.6+nobinonly-0ubuntu0.8.10.1 xulrunner-1.9 1.9.0.6+nobinonly-0ubuntu0.8.10.1
After a standard system upgrade you need to restart Firefox and any applications that use xulrunner, such as Epiphany, to effect the necessary changes.
http://www.securityspace.com/smysecure/catid.html?in=USN-717-1
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|