Description: | Description: The remote host is missing an update to firefox announced via advisory FEDORA-2010-10344.
Update Information:
Update to new upstream Firefox version 3.5.10, fixing a security issue detailed in the upstream advisory: http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.5.10 Update also includes packages depending on gecko-libs rebuilt against new version of Firefox / XULRunner.
References:
[ 1 ] Bug #577029 - CVE-2010-1121 firefox: arbitrary code execution via memory corruption https://bugzilla.redhat.com/show_bug.cgi?id=577029 [ 2 ] Bug #590804 - CVE-2010-1200 Mozilla Crashes with evidence of memory corruption https://bugzilla.redhat.com/show_bug.cgi?id=590804 [ 3 ] Bug #590810 - CVE-2010-1202 Mozilla Crashes with evidence of memory corruption https://bugzilla.redhat.com/show_bug.cgi?id=590810 [ 4 ] Bug #590822 - CVE-2010-0183 Mozilla Use-after-free error in nsCycleCollector::MarkRoots() https://bugzilla.redhat.com/show_bug.cgi?id=590822 [ 5 ] Bug #590828 - CVE-2010-1198 Mozilla Freed object reuse across plugin instances https://bugzilla.redhat.com/show_bug.cgi?id=590828 [ 6 ] Bug #590830 - CVE-2010-1196 Mozilla Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal https://bugzilla.redhat.com/show_bug.cgi?id=590830 [ 7 ] Bug #590833 - CVE-2010-1199 Mozilla Integer Overflow in XSLT Node Sorting https://bugzilla.redhat.com/show_bug.cgi?id=590833 [ 8 ] Bug #577584 - CVE-2010-1125 firefox: keystrokes sent to hidden frame rather than visible frame due to javascript flaw https://bugzilla.redhat.com/show_bug.cgi?id=577584 [ 9 ] Bug #590850 - CVE-2010-1197 Mozilla Content-Disposition: attachment ignored if Content-Type: multipart also present https://bugzilla.redhat.com/show_bug.cgi?id=590850 [ 10 ] Bug #480938 - CVE-2008-5913 mozilla: in-session phishing attack https://bugzilla.redhat.com/show_bug.cgi?id=480938
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update firefox' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2010-10344
Risk factor : Critical
CVSS Score: 10.0
|