Description: | Description:
The remote host is missing an update to firefox announced via advisory USN-468-1.
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 6.10 Ubuntu 7.04
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
Details follow:
Various flaws were discovered in the layout and JavaScript engines. By tricking a user into opening a malicious web page, an attacker could execute arbitrary code with the user's privileges. (CVE-2007-2867, CVE-2007-2868)
A flaw was discovered in the form autocomplete feature. By tricking a user into opening a malicious web page, an attacker could cause a persistent denial of service. (CVE-2007-2869)
Nicolas Derouet discovered flaws in cookie handling. By tricking a user into opening a malicious web page, an attacker could force the browser to consume large quantities of disk or memory while processing long cookie paths. (CVE-2007-1362)
A flaw was discovered in the same-origin policy handling of the addEventListener JavaScript method. A malicious web site could exploit this to modify the contents, or steal confidential data (such as passwords), of other web pages. (CVE-2007-2870)
Chris Thomas discovered a flaw in XUL popups. A malicious web site could exploit this to spoof or obscure portions of the browser UI, such as the location bar. (CVE-2007-2871)
Solution: The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: firefox 1.5.dfsg+1.5.0.12-0ubuntu0.6.06.1
Ubuntu 6.10: firefox 2.0.0.4+0dfsg-0ubuntu0.6.10
Ubuntu 7.04: firefox 2.0.0.4+1-0ubuntu1
After a standard system upgrade you need to restart Firefox to effect the necessary changes.
http://www.securityspace.com/smysecure/catid.html?in=USN-468-1
Risk factor : Critical
CVSS Score: 9.3
|