English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 61204 CVE descriptions
and 32582 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.66605
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-873-1 (xulrunner-1.9)
Summary:Ubuntu USN-873-1 (xulrunner-1.9)
Description:The remote host is missing an update to xulrunner-1.9
announced via advisory USN-873-1.

Details follow:

Jesse Ruderman, Josh Soref, Martijn Wargers, Jose Angel, Olli Pettay, and
David James discovered several flaws in the browser and JavaScript engines
of Firefox. If a user were tricked into viewing a malicious website, a
remote attacker could cause a denial of service or possibly execute
arbitrary code with the privileges of the user invoking the program.
(CVE-2009-3979, CVE-2009-3981, CVE-2009-3986)

Takehiro Takahashi discovered flaws in the NTLM implementation in Firefox.
If an NTLM authenticated user visited a malicious website, a remote
attacker could send requests to other applications, authenticated as the
user. (CVE-2009-3983)

Jonathan Morgan discovered that Firefox did not properly display SSL
indicators under certain circumstances. This could be used by an attacker
to spoof an encrypted page, such as in a phishing attack. (CVE-2009-3984)

Jordi Chancel discovered that Firefox did not properly display invalid URLs
for a blank page. If a user were tricked into accessing a malicious
website, an attacker could exploit this to spoof the location bar, such as
in a phishing attack. (CVE-2009-3985)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
firefox-3.0 3.0.16+nobinonly-0ubuntu0.8.04.1
xulrunner-1.9 1.9.0.16+nobinonly-0ubuntu0.8.04.1

Ubuntu 8.10:
abrowser 3.0.16+nobinonly-0ubuntu0.8.10.1
firefox-3.0 3.0.16+nobinonly-0ubuntu0.8.10.1
xulrunner-1.9 1.9.0.16+nobinonly-0ubuntu0.8.10.1

Ubuntu 9.04:
abrowser 3.0.16+nobinonly-0ubuntu0.9.04.1
firefox-3.0 3.0.16+nobinonly-0ubuntu0.9.04.1
xulrunner-1.9 1.9.0.16+nobinonly-0ubuntu0.9.04.1

After a standard system upgrade you need to restart Firefox and any
applications that use xulrunner to effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-873-1
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-3979
Debian Security Information: DSA-1956 (Google Search)
http://www.debian.org/security/2009/dsa-1956
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00995.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01034.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01041.html
RedHat Security Advisories: RHSA-2009:1673
https://rhn.redhat.com/errata/RHSA-2009-1673.html
RedHat Security Advisories: RHSA-2009:1674
https://rhn.redhat.com/errata/RHSA-2009-1674.html
http://www.redhat.com/support/errata/RHSA-2010-0153.html
http://www.redhat.com/support/errata/RHSA-2010-0154.html
SuSE Security Announcement: SUSE-SA:2009:063 (Google Search)
http://www.novell.com/linux/security/advisories/2009_63_firefox.html
http://www.ubuntu.com/usn/USN-873-1
http://www.ubuntu.com/usn/USN-874-1
BugTraq ID: 37349
http://www.securityfocus.com/bid/37349
BugTraq ID: 37361
http://www.securityfocus.com/bid/37361
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10956
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8487
http://securitytracker.com/id?1023333
http://securitytracker.com/id?1023334
http://secunia.com/advisories/37699
http://secunia.com/advisories/37703
http://secunia.com/advisories/37704
http://secunia.com/advisories/37785
http://secunia.com/advisories/37813
http://secunia.com/advisories/37856
http://secunia.com/advisories/37881
http://www.vupen.com/english/advisories/2009/3547
http://www.vupen.com/english/advisories/2010/0650
XForce ISS Database: mozilla-seamonkey-browser-code-exec(54799)
http://xforce.iss.net/xforce/xfdb/54799
Common Vulnerability Exposure (CVE) ID: CVE-2009-3981
BugTraq ID: 37363
http://www.securityfocus.com/bid/37363
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8523
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8584
XForce ISS Database: firefox-browser-engine-code-exec(54801)
http://xforce.iss.net/xforce/xfdb/54801
Common Vulnerability Exposure (CVE) ID: CVE-2009-3983
SuSE Security Announcement: SUSE-SR:2010:013 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
http://www.ubuntu.com/usn/USN-915-1
BugTraq ID: 37366
http://www.securityfocus.com/bid/37366
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10047
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8240
http://securitytracker.com/id?1023340
http://securitytracker.com/id?1023341
http://secunia.com/advisories/39001
http://secunia.com/advisories/38977
http://www.vupen.com/english/advisories/2010/0648
XForce ISS Database: firefox-ntlm-reflection(54807)
http://xforce.iss.net/xforce/xfdb/54807
Common Vulnerability Exposure (CVE) ID: CVE-2009-3984
BugTraq ID: 37367
http://www.securityfocus.com/bid/37367
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8379
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9791
http://securitytracker.com/id?1023342
http://securitytracker.com/id?1023343
XForce ISS Database: firefox-documentlocation-ssl-spoofing(54806)
http://xforce.iss.net/xforce/xfdb/54806
Common Vulnerability Exposure (CVE) ID: CVE-2009-3985
BugTraq ID: 37370
http://www.securityfocus.com/bid/37370
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8480
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9911
XForce ISS Database: firefox-documentlocation-spoofing(54808)
http://xforce.iss.net/xforce/xfdb/54808
Common Vulnerability Exposure (CVE) ID: CVE-2009-3986
BugTraq ID: 37365
http://www.securityfocus.com/bid/37365
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11568
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8489
http://securitytracker.com/id?1023344
http://securitytracker.com/id?1023345
XForce ISS Database: firefox-windowopener-code-execution(54803)
http://xforce.iss.net/xforce/xfdb/54803
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 32582 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.