Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2010:0861
The remote host is missing updates announced in
advisory RHSA-2010:0861.

Mozilla Firefox is an open source web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.

A race condition flaw was found in the way Firefox handled Document Object
Model (DOM) element properties. Malicious HTML content could cause Firefox
to crash or, potentially, execute arbitrary code with the privileges of the
user running Firefox. (CVE-2010-3765)

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user running
Firefox. (CVE-2010-3175, CVE-2010-3176, CVE-2010-3179, CVE-2010-3183,

A flaw was found in the way the Gopher parser in Firefox converted text
into HTML. A malformed file name on a Gopher server could, when accessed by
a victim running Firefox, allow arbitrary JavaScript to be executed in the
context of the Gopher domain. (CVE-2010-3177)

A same-origin policy bypass flaw was found in Firefox. An attacker could
create a malicious web page that, when viewed by a victim, could steal
private data from a different website the victim had loaded with Firefox.

A flaw was found in the script that launches Firefox. The LD_LIBRARY_PATH
variable was appending a . character, which could allow a local attacker
to execute arbitrary code with the privileges of a different user running
Firefox, if that user ran Firefox from within an attacker-controlled
directory. (CVE-2010-3182)

For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 3.6.11 and 3.6.12. You can find links to the Mozilla
advisories in the References section of this erratum.

All Firefox users should upgrade to these updated packages, which contain
Firefox version 3.6.12, which corrects these issues. After installing the
update, Firefox must be restarted for the changes to take effect.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : Critical

CVSS Score:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-3175
BugTraq ID: 44245
Common Vulnerability Exposure (CVE) ID: CVE-2010-3176
BugTraq ID: 44243
Debian Security Information: DSA-2124 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2010-3177
Common Vulnerability Exposure (CVE) ID: CVE-2010-3178
BugTraq ID: 44252
Common Vulnerability Exposure (CVE) ID: CVE-2010-3179
Common Vulnerability Exposure (CVE) ID: CVE-2010-3180
BugTraq ID: 44248
Common Vulnerability Exposure (CVE) ID: CVE-2010-3182
BugTraq ID: 44251
Common Vulnerability Exposure (CVE) ID: CVE-2010-3183
BugTraq ID: 44249
Common Vulnerability Exposure (CVE) ID: CVE-2010-3765
BugTraq ID: 44425
RedHat Security Advisories: RHSA-2010:0812
CopyrightCopyright (c) 2011 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.