![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.842407 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-2702-2) |
Summary: | The remote host is missing an update for the 'ubufox' package(s) announced via the USN-2702-2 advisory. |
Description: | Summary: The remote host is missing an update for the 'ubufox' package(s) announced via the USN-2702-2 advisory. Vulnerability Insight: USN-2702-1 fixed vulnerabilities in Firefox. This update provides the corresponding updates for Ubufox. Original advisory details: Gary Kwong, Christian Holler, Byron Campen, Tyson Smith, Bobby Holley, Chris Coulson, and Eric Rahm discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4473, CVE-2015-4474) Aki Helin discovered an out-of-bounds read when playing malformed MP3 content in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information, cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4475) A use-after-free was discovered during MediaStream playback in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4477) Andre Bargull discovered that non-configurable properties on javascript objects could be redefined when parsing JSON. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions. (CVE-2015-4478) Multiple integer overflows were discovered in libstagefright. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4479, CVE-2015-4480, CVE-2015-4493) Jukka Jylanki discovered a crash that occurs because javascript does not properly gate access to Atomics or SharedArrayBuffers in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service. (CVE-2015-4484) Abhishek Arya discovered 2 buffer overflows in libvpx when decoding malformed WebM content in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4485, CVE-2015-4486) Ronald Crane reported 3 security issues. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these, in combination with another security vulnerability, to cause a denial of service via application crash, or execute arbitrary code with ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'ubufox' package(s) on Ubuntu 12.04, Ubuntu 14.04, Ubuntu 15.04. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-4473 Debian Security Information: DSA-3333 (Google Search) http://www.debian.org/security/2015/dsa-3333 Debian Security Information: DSA-3410 (Google Search) http://www.debian.org/security/2015/dsa-3410 https://security.gentoo.org/glsa/201605-06 RedHat Security Advisories: RHSA-2015:1586 http://rhn.redhat.com/errata/RHSA-2015-1586.html RedHat Security Advisories: RHSA-2015:1682 http://rhn.redhat.com/errata/RHSA-2015-1682.html http://www.securitytracker.com/id/1033247 http://www.securitytracker.com/id/1033372 SuSE Security Announcement: SUSE-SU-2015:1449 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html SuSE Security Announcement: SUSE-SU-2015:1528 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html SuSE Security Announcement: SUSE-SU-2015:2081 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html SuSE Security Announcement: openSUSE-SU-2015:1389 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html SuSE Security Announcement: openSUSE-SU-2015:1390 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html SuSE Security Announcement: openSUSE-SU-2015:1453 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html SuSE Security Announcement: openSUSE-SU-2015:1454 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html http://www.ubuntu.com/usn/USN-2702-1 http://www.ubuntu.com/usn/USN-2702-2 http://www.ubuntu.com/usn/USN-2702-3 http://www.ubuntu.com/usn/USN-2712-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-4474 Common Vulnerability Exposure (CVE) ID: CVE-2015-4475 BugTraq ID: 76294 http://www.securityfocus.com/bid/76294 Common Vulnerability Exposure (CVE) ID: CVE-2015-4477 SuSE Security Announcement: openSUSE-SU-2016:0876 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html SuSE Security Announcement: openSUSE-SU-2016:0894 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html Common Vulnerability Exposure (CVE) ID: CVE-2015-4478 Common Vulnerability Exposure (CVE) ID: CVE-2015-4479 http://www.zerodayinitiative.com/advisories/ZDI-15-456 Common Vulnerability Exposure (CVE) ID: CVE-2015-4480 Common Vulnerability Exposure (CVE) ID: CVE-2015-4484 Common Vulnerability Exposure (CVE) ID: CVE-2015-4485 Common Vulnerability Exposure (CVE) ID: CVE-2015-4486 Common Vulnerability Exposure (CVE) ID: CVE-2015-4493 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |