Description: | Description:
The remote host is missing an update to mozilla-firefox announced via advisory USN-134-1.
A security issue affects the following Ubuntu releases:
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected: mozilla-firefox
It was discovered that a malicious website could inject arbitrary scripts into a target site by loading it into a frame and navigating back to a previous Javascript URL that contained an eval() call. This could be used to steal cookies or other confidential data from the target site. If the target site is allowed to raise the install confirmation dialog in Firefox then this flaw even allowed the malicious site to execute arbitrary code with the privileges of the Firefox user. By default only the Mozilla Update site is allowed to attempt software installation however, users can permit this for additional sites. (MFSA 2005-42)
Michael Krax, Georgi Guninski, and L. David Baron found that the security checks that prevent script injection could be bypassed by wrapping a javascript: url in another pseudo-protocol like view-source: or jar:. (CVE-2005-1531)
A variant of the attack described in CVE-2005-1160 (see USN-124-1) was discovered. Additional checks were added to make sure Javascript eval and Script objects are run with the privileges of the context that created them, not the potentially elevated privilege of the context calling them. (CVE-2005-1532)
Solution: The problem can be corrected by upgrading the affected package to version 1.0.2-0ubuntu5.3. After doing a standard system upgrade you need to restart Firefox to effect the necessary changes.
http://www.securityspace.com/smysecure/catid.html?in=USN-134-1
Risk factor : High
CVSS Score: 7.5
|