Description: | Summary: The remote host is missing an update for the 'firefox' package(s) announced via the USN-546-2 advisory.
Vulnerability Insight: USN-546-1 fixed vulnerabilities in Firefox. The upstream update included a faulty patch which caused the drawImage method of the canvas element to fail. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that Firefox incorrectly associated redirected sites as the origin of 'jar:' contents. A malicious web site could exploit this to modify or steal confidential data (such as passwords) from other web sites. (CVE-2007-5947)
Various flaws were discovered in the layout and JavaScript engines. By tricking a user into opening a malicious web page, an attacker could execute arbitrary code with the user's privileges. (CVE-2007-5959)
Gregory Fleischer discovered that it was possible to use JavaScript to manipulate Firefox's Referer header. A malicious web site could exploit this to conduct cross-site request forgeries against sites that relied only on Referer headers for protection from such attacks. (CVE-2007-5960)
Affected Software/OS: 'firefox' package(s) on Ubuntu 6.10, Ubuntu 7.04, Ubuntu 7.10.
Solution: Please install the updated package(s).
CVSS Score: 9.3
CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
|