Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2009:1095
The remote host is missing updates announced in
advisory RHSA-2009:1095.

Mozilla Firefox is an open source Web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code as the user running Firefox.
(CVE-2009-1392, CVE-2009-1832, CVE-2009-1833, CVE-2009-1837, CVE-2009-1838,

Multiple flaws were found in the processing of malformed, local file
content. If a user loaded malicious, local content via the file:// URL, it
was possible for that content to access other local data. (CVE-2009-1835,

A script, privilege elevation flaw was found in the way Firefox loaded XML
User Interface Language (XUL) scripts. Firefox and certain add-ons could
load malicious content when certain policy checks did not happen.

A flaw was found in the way Firefox displayed certain Unicode characters in
International Domain Names (IDN). If an IDN contained invalid characters,
they may have been displayed as spaces, making it appear to the user that
they were visiting a trusted site. (CVE-2009-1834)

A flaw was found in the way Firefox handled error responses returned from
proxy servers. If an attacker is able to conduct a man-in-the-middle attack
against a Firefox instance that is using a proxy server, they may be able
to steal sensitive information from the site the user is visiting.

For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 3.0.11. You can find a link to the Mozilla
advisories in the References section of this errata.

All Firefox users should upgrade to these updated packages, which contain
Firefox version 3.0.11, which corrects these issues. After installing the
update, Firefox must be restarted for the changes to take effect.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-1392
BugTraq ID: 35326
BugTraq ID: 35370
Debian Security Information: DSA-1820 (Google Search)
Debian Security Information: DSA-1830 (Google Search)
RedHat Security Advisories: RHSA-2009:1095
RedHat Security Advisories: RHSA-2009:1096
Common Vulnerability Exposure (CVE) ID: CVE-2009-1832
BugTraq ID: 35371
Common Vulnerability Exposure (CVE) ID: CVE-2009-1833
BugTraq ID: 35372
Common Vulnerability Exposure (CVE) ID: CVE-2009-1834
BugTraq ID: 35388
Common Vulnerability Exposure (CVE) ID: CVE-2009-1835
BugTraq ID: 35391
Common Vulnerability Exposure (CVE) ID: CVE-2009-1836
BugTraq ID: 35380
Common Vulnerability Exposure (CVE) ID: CVE-2009-1837
BugTraq ID: 35360
Bugtraq: 20090612 Secunia Research: Mozilla Firefox Java Applet Loading Vulnerability (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2009-1838
BugTraq ID: 35383
Common Vulnerability Exposure (CVE) ID: CVE-2009-1839
BugTraq ID: 35386
Common Vulnerability Exposure (CVE) ID: CVE-2009-1840
XForce ISS Database: firefox-xul-security-bypass(51076)
Common Vulnerability Exposure (CVE) ID: CVE-2009-1841
BugTraq ID: 35373
CopyrightCopyright (c) 2009 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.