English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75096 CVE descriptions
and 39644 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.68213
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-930-1 (xulrunner-1.9.2)
Summary:Ubuntu USN-930-1 (xulrunner-1.9.2)
Description:The remote host is missing an update to xulrunner-1.9.2
announced via advisory USN-930-1.

Details follow:

If was discovered that Firefox could be made to access freed memory. If a
user were tricked into viewing a malicious site, a remote attacker could
cause a denial of service or possibly execute arbitrary code with the
privileges of the user invoking the program. This issue only affected
Ubuntu 8.04 LTS. (CVE-2010-1121)

Several flaws were discovered in the browser engine of Firefox. If a
user were tricked into viewing a malicious site, a remote attacker could
cause a denial of service or possibly execute arbitrary code with the
privileges of the user invoking the program. (CVE-2010-1200, CVE-2010-1201,
CVE-2010-1202, CVE-2010-1203)

A flaw was discovered in the way plugin instances interacted. An attacker
could potentially exploit this and use one plugin to access freed memory from a
second plugin to execute arbitrary code with the privileges of the user
invoking the program. (CVE-2010-1198)

An integer overflow was discovered in Firefox. If a user were tricked into
viewing a malicious site, an attacker could overflow a buffer and cause a
denial of service or possibly execute arbitrary code with the privileges of
the user invoking the program. (CVE-2010-1196)

Martin Barbella discovered an integer overflow in an XSLT node sorting
routine. An attacker could exploit this to overflow a buffer and cause a
denial of service or possibly execute arbitrary code with the privileges of
the user invoking the program. (CVE-2010-1199)

Michal Zalewski discovered that the focus behavior of Firefox could be
subverted. If a user were tricked into viewing a malicious site, a remote
attacker could use this to capture keystrokes. (CVE-2010-1125)

Ilja van Sprundel discovered that the 'Content-Disposition: attachment'
HTTP header was ignored when 'Content-Type: multipart' was also present.
Under certain circumstances, this could potentially lead to cross-site
scripting attacks. (CVE-2010-1197)

Amit Klein discovered that Firefox did not seed its random number generator
often enough. An attacker could exploit this to identify and track users
across different web sites. (CVE-2008-5913)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
firefox 3.6.6+nobinonly-0ubuntu0.8.04.1
xulrunner-1.9.2 1.9.2.6+nobinonly-0ubuntu0.8.04.1

Ubuntu 10.04 LTS:
abrowser 3.6.6+nobinonly-0ubuntu0.10.04.1
firefox 3.6.6+nobinonly-0ubuntu0.10.04.1
xulrunner-1.9.2 1.9.2.6+nobinonly-0ubuntu0.10.04.1

Mozilla has changed the support model for Firefox and they no longer
support version 3.0 of the browser. As a result, Ubuntu is providing an
upgrade to Firefox 3.6 for Ubuntu 8.04 LTS users, which is the most current
stable release of Firefox supported by Mozilla. When upgrading, users
should be aware of the following:

- Firefox 3.6 does not support version 5 of the Sun Java plugin. Please use
icedtea-java7-plugin or sun-java6-plugin instead.
- After upgrading to Firefox 3.6.6, users may be prompted to upgrade 3rd
party Add-Ons. In some cases, an Add-On will not be compatible with
Firefox 3.6.6 and have no update available. In these cases, Firefox will
notify the user that it is disabling the Add-On.
- Upgrades to Ubuntu 8.10 from Ubuntu 8.04 LTS may break the browser.
Ubuntu 8.10 is no longer officially supported and users are required to
upgrade to 9.04 to receive active security support and a functional browser.
- Font configuration cannot be controlled via Gnome settings. This is a
known issue being tracked in https://launchpad.net/bugs/559149 and will
be fixed in a later update.
- helix-player is not currently supported in Firefox 3.6. This is a known
issue and may be fixed in a future update.
- RealAudio via the totem plugin is no longer supported in Firefox 3.6 in
Ubuntu 8.04 LTS. Affected users navigating to Real content will be
prompted to install optional community supported packages.
- In Ubuntu 8.04 LTS the xine plugin is non-functional. After upgrading to
Firefox 3.6, the plugin may cause the browser to crash, while in Firefox
3.0 it would be silently ignored. Users are advised to uninstall
xine-plugin and/or gxineplugin.
- Plugins using external helpers (such as Totem) may not close when using
the Epiphany browser. This is a known issue being tracked in
https://launchpad.net/bugs/599796 and will be fixed in a later update.
This issue only affects Ubuntu 8.04 LTS.

After a standard system upgrade you need to restart Firefox and any
applications that use Xulrunner to effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-930-1

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-5913
http://arstechnica.com/news.ars/post/20090113-new-method-of-phishmongering-could-fool-experienced-users.html
http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161
http://www.infoworld.com/article/09/01/13/Browser_bug_could_allow_phishing_without_email_1.html
http://www.trusteer.com/files/In-session-phishing-advisory-2.pdf
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html
http://www.mandriva.com/security/advisories?name=MDVSA-2010:125
http://www.redhat.com/support/errata/RHSA-2010-0500.html
http://www.redhat.com/support/errata/RHSA-2010-0501.html
SuSE Security Announcement: SUSE-SA:2010:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html
http://ubuntu.com/usn/usn-930-1
http://www.ubuntu.com/usn/usn-930-2
BugTraq ID: 33276
http://www.securityfocus.com/bid/33276
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11139
http://secunia.com/advisories/40326
http://secunia.com/advisories/40401
http://secunia.com/advisories/40481
http://www.vupen.com/english/advisories/2010/1551
http://www.vupen.com/english/advisories/2010/1557
http://www.vupen.com/english/advisories/2010/1640
http://www.vupen.com/english/advisories/2010/1773
http://www.vupen.com/english/advisories/2010/1592
Common Vulnerability Exposure (CVE) ID: CVE-2010-1121
http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010
http://news.cnet.com/8301-27080_3-20001126-245.html
http://twitter.com/thezdi/statuses/11005277222
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10924
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6844
http://www.securitytracker.com/id?1023817
http://secunia.com/advisories/40323
Common Vulnerability Exposure (CVE) ID: CVE-2010-1125
Bugtraq: 20100313 ...because you can't get enough of clickjacking (Google Search)
http://www.securityfocus.com/archive/1/archive/1/510070/100/0/threaded
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10386
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:13962
http://www.securitytracker.com/id?1024138
Common Vulnerability Exposure (CVE) ID: CVE-2010-1196
BugTraq ID: 41050
http://www.securityfocus.com/bid/41050
BugTraq ID: 41087
http://www.securityfocus.com/bid/41087
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11424
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14017
http://www.securitytracker.com/id?1024139
XForce ISS Database: firefox-nsgenericdomdatanode-bo(59665)
http://xforce.iss.net/xforce/xfdb/59665
Common Vulnerability Exposure (CVE) ID: CVE-2010-1197
http://www.redhat.com/support/errata/RHSA-2010-0499.html
BugTraq ID: 41103
http://www.securityfocus.com/bid/41103
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10168
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14186
http://www.vupen.com/english/advisories/2010/1556
XForce ISS Database: firefox-contentdisposition-security-bypass(59667)
http://xforce.iss.net/xforce/xfdb/59667
Common Vulnerability Exposure (CVE) ID: CVE-2010-1198
BugTraq ID: 41102
http://www.securityfocus.com/bid/41102
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10990
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14176
XForce ISS Database: firefox-plugin-instances-code-exec(59664)
http://xforce.iss.net/xforce/xfdb/59664
Common Vulnerability Exposure (CVE) ID: CVE-2010-1199
Bugtraq: 20100623 ZDI-10-113: Mozilla Firefox XSLT Sort Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/511972/100/0/threaded
http://www.exploit-db.com/exploits/14949
http://www.zerodayinitiative.com/advisories/ZDI-10-113
BugTraq ID: 41082
http://www.securityfocus.com/bid/41082
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10885
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:13287
XForce ISS Database: firefox-xslt-node-code-execution(59666)
http://xforce.iss.net/xforce/xfdb/59666
Common Vulnerability Exposure (CVE) ID: CVE-2010-1200
BugTraq ID: 41090
http://www.securityfocus.com/bid/41090
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10816
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14326
XForce ISS Database: firefox-seamonkey-browser-code-exec(59659)
http://xforce.iss.net/xforce/xfdb/59659
Common Vulnerability Exposure (CVE) ID: CVE-2010-1201
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12671
Common Vulnerability Exposure (CVE) ID: CVE-2010-1202
BugTraq ID: 41094
http://www.securityfocus.com/bid/41094
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10889
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14308
XForce ISS Database: firefox-javascript-ce(59661)
http://xforce.iss.net/xforce/xfdb/59661
Common Vulnerability Exposure (CVE) ID: CVE-2010-1203
BugTraq ID: 41099
http://www.securityfocus.com/bid/41099
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10401
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8317
XForce ISS Database: mozilla-firefox-javascript-ce(59662)
http://xforce.iss.net/xforce/xfdb/59662
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

This is only one of 39644 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.