Description: | Description: The remote host is missing an update to xulrunner announced via advisory FEDORA-2010-14362.
References:
[ 1 ] Bug #630055 - CVE-2010-3169 Mozilla Miscellaneous memory safety hazards https://bugzilla.redhat.com/show_bug.cgi?id=630055 [ 2 ] Bug #630056 - CVE-2010-2765 Mozilla Frameset integer overflow vulnerability (MFSA 2010-50) https://bugzilla.redhat.com/show_bug.cgi?id=630056 [ 3 ] Bug #630059 - CVE-2010-2767 Mozilla Dangling pointer vulnerability using DOM plugin array (MFSA 2010-51) https://bugzilla.redhat.com/show_bug.cgi?id=630059 [ 4 ] Bug #630061 - CVE-2010-3166 Mozilla Heap buffer overflow in nsTextFrameUtils::TransformText (MFSA 2010-53) https://bugzilla.redhat.com/show_bug.cgi?id=630061 [ 5 ] Bug #630062 - CVE-2010-2760 Mozilla Dangling pointer vulnerability in nsTreeSelection (MFSA 2010-54) https://bugzilla.redhat.com/show_bug.cgi?id=630062 [ 6 ] Bug #630064 - CVE-2010-3168 Mozilla XUL tree removal crash and remote code execution (MFSA 2010-55) https://bugzilla.redhat.com/show_bug.cgi?id=630064 [ 7 ] Bug #630067 - CVE-2010-3167 Mozilla Dangling pointer vulnerability in nsTreeContentView (MFSA 2010-56) https://bugzilla.redhat.com/show_bug.cgi?id=630067 [ 8 ] Bug #630069 - CVE-2010-2766 Mozilla Crash and remote code execution in normalizeDocument (MFSA 2010-57) https://bugzilla.redhat.com/show_bug.cgi?id=630069 [ 9 ] Bug #631725 - CVE-2010-2763 Mozilla XSS using SJOW scripted function (MFSA 2010-60) https://bugzilla.redhat.com/show_bug.cgi?id=631725 [ 10 ] Bug #630074 - CVE-2010-2768 Mozilla UTF-7 XSS by overriding document charset using type attribute (MFSA 2010-61) https://bugzilla.redhat.com/show_bug.cgi?id=630074 [ 11 ] Bug #630075 - CVE-2010-2769 Mozilla Copy-and-paste or drag-and-drop into designMode document allows XSS (MFSA 2010-62) https://bugzilla.redhat.com/show_bug.cgi?id=630075 [ 12 ] Bug #630078 - CVE-2010-2764 Mozilla Information leak via XMLHttpRequest statusText (MFSA 2010-63) https://bugzilla.redhat.com/show_bug.cgi?id=630078
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update xulrunner' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2010-14362
Risk factor : Critical
CVSS Score: 9.3
|