Description: | Description: The remote host is missing an update to xulrunner announced via advisory FEDORA-2010-11375.
References:
[ 1 ] Bug #615455 - CVE-2010-1211 Mozilla miscellaneous memory safety hazards https://bugzilla.redhat.com/show_bug.cgi?id=615455 [ 2 ] Bug #615458 - CVE-2010-1208 Mozilla DOM attribute cloning remote code execution vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=615458 [ 3 ] Bug #615459 - CVE-2010-1209 Mozilla Use-after-free error in NodeIterator https://bugzilla.redhat.com/show_bug.cgi?id=615459 [ 4 ] Bug #615462 - CVE-2010-1214 Mozilla Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=615462 [ 5 ] Bug #615464 - CVE-2010-2752 Mozilla nsCSSValue::Array index integer overflow https://bugzilla.redhat.com/show_bug.cgi?id=615464 [ 6 ] Bug #615466 - CVE-2010-2753 Mozilla nsTreeSelection dangling pointer remote code execution vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=615466 [ 7 ] Bug #608238 - CVE-2010-1205 libpng: out-of-bounds memory write https://bugzilla.redhat.com/show_bug.cgi?id=608238 [ 8 ] Bug #615471 - CVE-2010-1213 Mozilla Cross-origin data disclosure via Web Workers and importScripts https://bugzilla.redhat.com/show_bug.cgi?id=615471 [ 9 ] Bug #608763 - CVE-2010-1206 Firefox: Spoofing attacks via vectors involving 'No Content' status code or via a windows.stop call https://bugzilla.redhat.com/show_bug.cgi?id=608763 [ 10 ] Bug #615480 - CVE-2010-2751 Mozilla SSL spoofing with history.back() and history.forward() https://bugzilla.redhat.com/show_bug.cgi?id=615480 [ 11 ] Bug #568231 - CVE-2010-0654 firefox: cross-domain information disclosure https://bugzilla.redhat.com/show_bug.cgi?id=568231 [ 12 ] Bug #615488 - CVE-2010-2754 Mozilla Cross-origin data leakage from script filename in error messages https://bugzilla.redhat.com/show_bug.cgi?id=615488
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update xulrunner' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2010-11375
Risk factor : Critical
CVSS Score: 9.3
|