Description: | Summary: The remote host is missing an update for the 'firefox' package(s) announced via the USN-490-1 advisory.
Vulnerability Insight: Various flaws were discovered in the layout and JavaScript engines. By tricking a user into opening a malicious web page, an attacker could execute arbitrary code with the user's privileges. (CVE-2007-3734, CVE-2007-3735)
Flaws were discovered in the JavaScript methods addEventListener and setTimeout which could be used to inject script into another site in violation of the browser's same-origin policy. A malicious web site could exploit this to modify the contents, or steal confidential data (such as passwords), of other web pages. (CVE-2007-3736)
Ronen Zilberman and Michal Zalewski discovered timing attacks in the JavaScript engine's use of about:blank frames. A malicious web site could exploit this to modify the contents, or steal confidential data (such as passwords), of other web pages. (CVE-2007-3089)
A flaw was discovered in the JavaScript event handling code. By tricking a user into opening a malicious web page, an attacker could execute arbitrary code with the user's privileges. (CVE-2007-3737)
Ronald van den Heetkamp discovered that filename URLs including an encoded null byte could confuse the extension matching code. By tricking a user into opening a malicious web page, an attacker could execute arbitrary helper programs. (CVE-2007-3285)
Michal Zalewski discovered flaws in the same-origin handling of cached 'wyciwyg://' documents. A malicious web site could exploit this to modify the contents, or steal confidential data (such as passwords), of other web pages. (CVE-2007-3656)
Various flaws were discovered in the XPCNativeWrapper method. By tricking a user into opening a malicious web page, an attacker could execute arbitrary code with the user's privileges. (CVE-2007-3738).
Affected Software/OS: 'firefox' package(s) on Ubuntu 6.06, Ubuntu 6.10, Ubuntu 7.04.
Solution: Please install the updated package(s).
CVSS Score: 9.3
CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
|