English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 61204 CVE descriptions
and 32582 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.66606
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-874-1 (xulrunner-1.9.1)
Summary:Ubuntu USN-874-1 (xulrunner-1.9.1)
Description:The remote host is missing an update to xulrunner-1.9.1
announced via advisory USN-874-1.

Details follow:

Jesse Ruderman, Josh Soref, Martijn Wargers, Jose Angel, Olli Pettay, and
David James discovered several flaws in the browser and JavaScript engines
of Firefox. If a user were tricked into viewing a malicious website, a
remote attacker could cause a denial of service or possibly execute
arbitrary code with the privileges of the user invoking the program.
(CVE-2009-3979, CVE-2009-3980, CVE-2009-3982, CVE-2009-3986)

Takehiro Takahashi discovered flaws in the NTLM implementation in Firefox.
If an NTLM authenticated user visited a malicious website, a remote
attacker could send requests to other applications, authenticated as the
user. (CVE-2009-3983)

Jonathan Morgan discovered that Firefox did not properly display SSL
indicators under certain circumstances. This could be used by an attacker
to spoof an encrypted page, such as in a phishing attack. (CVE-2009-3984)

Jordi Chancel discovered that Firefox did not properly display invalid URLs
for a blank page. If a user were tricked into accessing a malicious
website, an attacker could exploit this to spoof the location bar, such as
in a phishing attack. (CVE-2009-3985)

David Keeler, Bob Clary, and Dan Kaminsky discovered several flaws in third
party media libraries. If a user were tricked into opening a crafted media
file, a remote attacker could cause a denial of service or possibly execute
arbitrary code with the privileges of the user invoking the program.
(CVE-2009-3388, CVE-2009-3389)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.10:
firefox-3.5 3.5.6+nobinonly-0ubuntu0.9.10.1
xulrunner-1.9.1 1.9.1.6+nobinonly-0ubuntu0.9.10.1

After a standard system upgrade you need to restart Firefox and any
applications that use xulrunner to effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-874-1
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-3388
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00995.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01034.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01041.html
SuSE Security Announcement: SUSE-SA:2009:063 (Google Search)
http://www.novell.com/linux/security/advisories/2009_63_firefox.html
http://www.ubuntu.com/usn/USN-874-1
BugTraq ID: 37349
http://www.securityfocus.com/bid/37349
BugTraq ID: 37369
http://www.securityfocus.com/bid/37369
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8009
http://securitytracker.com/id?1023335
http://securitytracker.com/id?1023336
http://secunia.com/advisories/37699
http://secunia.com/advisories/37785
http://secunia.com/advisories/37856
http://secunia.com/advisories/37881
http://www.vupen.com/english/advisories/2009/3547
XForce ISS Database: mozilla-liboggplay-code-execution(54804)
http://xforce.iss.net/xforce/xfdb/54804
Common Vulnerability Exposure (CVE) ID: CVE-2009-3389
http://www.theora.org/news/#libtheora-1.1.0
http://www.mandriva.com/security/advisories?name=MDVSA-2010:043
SuSE Security Announcement: SUSE-SR:2010:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
SuSE Security Announcement: SUSE-SR:2010:013 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
BugTraq ID: 37368
http://www.securityfocus.com/bid/37368
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7967
http://secunia.com/advisories/39317
XForce ISS Database: mozilla-theora-bo(54805)
http://xforce.iss.net/xforce/xfdb/54805
Common Vulnerability Exposure (CVE) ID: CVE-2009-3979
Debian Security Information: DSA-1956 (Google Search)
http://www.debian.org/security/2009/dsa-1956
RedHat Security Advisories: RHSA-2009:1673
https://rhn.redhat.com/errata/RHSA-2009-1673.html
RedHat Security Advisories: RHSA-2009:1674
https://rhn.redhat.com/errata/RHSA-2009-1674.html
http://www.redhat.com/support/errata/RHSA-2010-0153.html
http://www.redhat.com/support/errata/RHSA-2010-0154.html
http://www.ubuntu.com/usn/USN-873-1
BugTraq ID: 37361
http://www.securityfocus.com/bid/37361
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10956
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8487
http://securitytracker.com/id?1023333
http://securitytracker.com/id?1023334
http://secunia.com/advisories/37703
http://secunia.com/advisories/37704
http://secunia.com/advisories/37813
http://www.vupen.com/english/advisories/2010/0650
XForce ISS Database: mozilla-seamonkey-browser-code-exec(54799)
http://xforce.iss.net/xforce/xfdb/54799
Common Vulnerability Exposure (CVE) ID: CVE-2009-3980
BugTraq ID: 37362
http://www.securityfocus.com/bid/37362
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8503
XForce ISS Database: firefox-browser-eng-code-exec(54800)
http://xforce.iss.net/xforce/xfdb/54800
Common Vulnerability Exposure (CVE) ID: CVE-2009-3982
BugTraq ID: 37364
http://www.securityfocus.com/bid/37364
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8434
http://secunia.com/advisories/37783
http://www.vupen.com/english/advisories/2009/3558
XForce ISS Database: firefox-javascript-eng-code-exec(54802)
http://xforce.iss.net/xforce/xfdb/54802
Common Vulnerability Exposure (CVE) ID: CVE-2009-3983
http://www.ubuntu.com/usn/USN-915-1
BugTraq ID: 37366
http://www.securityfocus.com/bid/37366
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10047
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8240
http://securitytracker.com/id?1023340
http://securitytracker.com/id?1023341
http://secunia.com/advisories/39001
http://secunia.com/advisories/38977
http://www.vupen.com/english/advisories/2010/0648
XForce ISS Database: firefox-ntlm-reflection(54807)
http://xforce.iss.net/xforce/xfdb/54807
Common Vulnerability Exposure (CVE) ID: CVE-2009-3984
BugTraq ID: 37367
http://www.securityfocus.com/bid/37367
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8379
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9791
http://securitytracker.com/id?1023342
http://securitytracker.com/id?1023343
XForce ISS Database: firefox-documentlocation-ssl-spoofing(54806)
http://xforce.iss.net/xforce/xfdb/54806
Common Vulnerability Exposure (CVE) ID: CVE-2009-3985
BugTraq ID: 37370
http://www.securityfocus.com/bid/37370
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8480
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9911
XForce ISS Database: firefox-documentlocation-spoofing(54808)
http://xforce.iss.net/xforce/xfdb/54808
Common Vulnerability Exposure (CVE) ID: CVE-2009-3986
BugTraq ID: 37365
http://www.securityfocus.com/bid/37365
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11568
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8489
http://securitytracker.com/id?1023344
http://securitytracker.com/id?1023345
XForce ISS Database: firefox-windowopener-code-execution(54803)
http://xforce.iss.net/xforce/xfdb/54803
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 32582 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.