Description: | Description:
The remote host is missing an update to xulrunner announced via advisory FEDORA-2008-9669. For details, please visit the referenced security advisories.
ChangeLog:
* Wed Nov 12 2008 Christopher Aillon 1.9.0.4-1 - Update to 1.9.0.4 * Tue Sep 23 2008 Christopher Aillon 1.9.0.2-1 - Update to 1.9.0.2 * Wed Jul 16 2008 Christopher Aillon 1.9.0.1-1 - Update to 1.9.0.1
References:
[ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass https://bugzilla.redhat.com/show_bug.cgi?id=470903 [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges https://bugzilla.redhat.com/show_bug.cgi?id=470876 [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory corruption https://bugzilla.redhat.com/show_bug.cgi?id=470883 [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore https://bugzilla.redhat.com/show_bug.cgi?id=470889 [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in nsFrameManager https://bugzilla.redhat.com/show_bug.cgi?id=470894 [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses security checks on codebase principals https://bugzilla.redhat.com/show_bug.cgi?id=470898 [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via __proto__ tampering https://bugzilla.redhat.com/show_bug.cgi?id=470873 [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory corruption https://bugzilla.redhat.com/show_bug.cgi?id=470881 [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory corruption https://bugzilla.redhat.com/show_bug.cgi?id=470884 [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in http-index-format parser https://bugzilla.redhat.com/show_bug.cgi?id=470892 [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla nsXMLHttpRequest::NotifyEventListeners() same-origin violation https://bugzilla.redhat.com/show_bug.cgi?id=470895 [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default namespace https://bugzilla.redhat.com/show_bug.cgi?id=470902
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update xulrunner' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2008-9669
Risk factor : Critical
CVSS Score: 10.0
|