Description: | Summary: The remote host is missing an update for the Debian 'xulrunner' package(s) announced via the DSA-1704-1 advisory.
Vulnerability Insight: Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2008-5500
Jesse Ruderman discovered that the layout engine is vulnerable to DoS attacks that might trigger memory corruption and an integer overflow. (MFSA 2008-60)
CVE-2008-5503
Boris Zbarsky discovered that an information disclosure attack could be performed via XBL bindings. (MFSA 2008-61)
CVE-2008-5506
Marius Schilder discovered that it is possible to obtain sensible data via a XMLHttpRequest. (MFSA 2008-64)
CVE-2008-5507
Chris Evans discovered that it is possible to obtain sensible data via a JavaScript URL. (MFSA 2008-65)
CVE-2008-5508
Chip Salzenberg discovered possible phishing attacks via URLs with leading whitespaces or control characters. (MFSA 2008-66)
CVE-2008-5511
It was discovered that it is possible to perform cross-site scripting attacks via an XBL binding to an 'unloaded document.' (MFSA 2008-68)
CVE-2008-5512
It was discovered that it is possible to run arbitrary JavaScript with chrome privileges via unknown vectors. (MFSA 2008-68)
For the stable distribution (etch) these problems have been fixed in version 1.8.0.15~ pre080614i-0etch1.
For the testing distribution (lenny) and the unstable distribution (sid) these problems have been fixed in version 1.9.0.5-1.
We recommend that you upgrade your xulrunner packages.
Affected Software/OS: 'xulrunner' package(s) on Debian 4.
Solution: Please install the updated package(s).
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|