English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 73247 CVE descriptions
and 39212 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.67647
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-930-3 (firefox)
Summary:Ubuntu USN-930-3 (firefox)
Description:The remote host is missing an update to firefox
announced via advisory USN-930-3.

Details follow:

USN-930-1 fixed vulnerabilities in Firefox. Due to a software packaging
problem, the Firefox 3.6 update could not be installed when the firefox-2
package was also installed. This update fixes the problem and updates
apturl for the change.

Original advisory details:

If was discovered that Firefox could be made to access freed memory. If a
user were tricked into viewing a malicious site, a remote attacker could
cause a denial of service or possibly execute arbitrary code with the
privileges of the user invoking the program. This issue only affected
Ubuntu 8.04 LTS. (CVE-2010-1121)

Several flaws were discovered in the browser engine of Firefox. If a
user were tricked into viewing a malicious site, a remote attacker could
cause a denial of service or possibly execute arbitrary code with the
privileges of the user invoking the program. (CVE-2010-1200, CVE-2010-1201,
CVE-2010-1202, CVE-2010-1203)

A flaw was discovered in the way plugin instances interacted. An attacker
could potentially exploit this and use one plugin to access freed memory from a
second plugin to execute arbitrary code with the privileges of the user
invoking the program. (CVE-2010-1198)

An integer overflow was discovered in Firefox. If a user were tricked into
viewing a malicious site, an attacker could overflow a buffer and cause a
denial of service or possibly execute arbitrary code with the privileges of
the user invoking the program. (CVE-2010-1196)

Martin Barbella discovered an integer overflow in an XSLT node sorting
routine. An attacker could exploit this to overflow a buffer and cause a
denial of service or possibly execute arbitrary code with the privileges of
the user invoking the program. (CVE-2010-1199)

Michal Zalewski discovered that the focus behavior of Firefox could be
subverted. If a user were tricked into viewing a malicious site, a remote
attacker could use this to capture keystrokes. (CVE-2010-1125)

Ilja van Sprundel discovered that the 'Content-Disposition: attachment'
HTTP header was ignored when 'Content-Type: multipart' was also present.
Under certain circumstances, this could potentially lead to cross-site
scripting attacks. (CVE-2010-1197)

Amit Klein discovered that Firefox did not seed its random number generator
often enough. An attacker could exploit this to identify and track users
across different web sites. (CVE-2008-5913)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
apturl 0.2.2ubuntu1.2
firefox-3.0 3.6.6+nobinonly-0ubuntu0.8.04.2

After a standard system upgrade you need to restart Firefox to effect
the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-930-3

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-1121
http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010
http://news.cnet.com/8301-27080_3-20001126-245.html
http://twitter.com/thezdi/statuses/11005277222
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html
http://www.redhat.com/support/errata/RHSA-2010-0500.html
http://www.redhat.com/support/errata/RHSA-2010-0501.html
SuSE Security Announcement: SUSE-SA:2010:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html
http://ubuntu.com/usn/usn-930-1
http://www.ubuntu.com/usn/usn-930-2
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10924
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6844
http://www.securitytracker.com/id?1023817
http://secunia.com/advisories/40323
http://secunia.com/advisories/40326
http://secunia.com/advisories/40401
http://secunia.com/advisories/40481
http://www.vupen.com/english/advisories/2010/1557
http://www.vupen.com/english/advisories/2010/1640
http://www.vupen.com/english/advisories/2010/1773
http://www.vupen.com/english/advisories/2010/1592
Common Vulnerability Exposure (CVE) ID: CVE-2010-1200
http://www.mandriva.com/security/advisories?name=MDVSA-2010:125
http://www.redhat.com/support/errata/RHSA-2010-0499.html
BugTraq ID: 41050
http://www.securityfocus.com/bid/41050
BugTraq ID: 41090
http://www.securityfocus.com/bid/41090
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10816
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14326
http://www.securitytracker.com/id?1024138
http://www.securitytracker.com/id?1024139
http://www.vupen.com/english/advisories/2010/1551
http://www.vupen.com/english/advisories/2010/1556
XForce ISS Database: firefox-seamonkey-browser-code-exec(59659)
http://xforce.iss.net/xforce/xfdb/59659
Common Vulnerability Exposure (CVE) ID: CVE-2010-1201
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12671
Common Vulnerability Exposure (CVE) ID: CVE-2010-1202
BugTraq ID: 41094
http://www.securityfocus.com/bid/41094
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10889
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14308
XForce ISS Database: firefox-javascript-ce(59661)
http://xforce.iss.net/xforce/xfdb/59661
Common Vulnerability Exposure (CVE) ID: CVE-2010-1203
BugTraq ID: 41099
http://www.securityfocus.com/bid/41099
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10401
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8317
XForce ISS Database: mozilla-firefox-javascript-ce(59662)
http://xforce.iss.net/xforce/xfdb/59662
Common Vulnerability Exposure (CVE) ID: CVE-2010-1198
BugTraq ID: 41102
http://www.securityfocus.com/bid/41102
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10990
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14176
XForce ISS Database: firefox-plugin-instances-code-exec(59664)
http://xforce.iss.net/xforce/xfdb/59664
Common Vulnerability Exposure (CVE) ID: CVE-2010-1196
BugTraq ID: 41087
http://www.securityfocus.com/bid/41087
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11424
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14017
XForce ISS Database: firefox-nsgenericdomdatanode-bo(59665)
http://xforce.iss.net/xforce/xfdb/59665
Common Vulnerability Exposure (CVE) ID: CVE-2010-1199
Bugtraq: 20100623 ZDI-10-113: Mozilla Firefox XSLT Sort Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/511972/100/0/threaded
http://www.exploit-db.com/exploits/14949
http://www.zerodayinitiative.com/advisories/ZDI-10-113
BugTraq ID: 41082
http://www.securityfocus.com/bid/41082
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10885
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:13287
XForce ISS Database: firefox-xslt-node-code-execution(59666)
http://xforce.iss.net/xforce/xfdb/59666
Common Vulnerability Exposure (CVE) ID: CVE-2010-1125
Bugtraq: 20100313 ...because you can't get enough of clickjacking (Google Search)
http://www.securityfocus.com/archive/1/archive/1/510070/100/0/threaded
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10386
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:13962
Common Vulnerability Exposure (CVE) ID: CVE-2010-1197
BugTraq ID: 41103
http://www.securityfocus.com/bid/41103
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10168
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14186
XForce ISS Database: firefox-contentdisposition-security-bypass(59667)
http://xforce.iss.net/xforce/xfdb/59667
Common Vulnerability Exposure (CVE) ID: CVE-2008-5913
http://arstechnica.com/news.ars/post/20090113-new-method-of-phishmongering-could-fool-experienced-users.html
http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161
http://www.infoworld.com/article/09/01/13/Browser_bug_could_allow_phishing_without_email_1.html
http://www.trusteer.com/files/In-session-phishing-advisory-2.pdf
BugTraq ID: 33276
http://www.securityfocus.com/bid/33276
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11139
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

This is only one of 39212 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.