![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.842512 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-2785-1) |
Summary: | The remote host is missing an update for the 'firefox' package(s) announced via the USN-2785-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'firefox' package(s) announced via the USN-2785-1 advisory. Vulnerability Insight: Christian Holler, David Major, Jesse Ruderman, Tyson Smith, Boris Zbarsky, Randell Jesup, Olli Pettay, Karl Tomlinson, Jeff Walden, Gary Kwong, Andrew McCreight, Georg Fritzsche, and Carsten Book discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4513, CVE-2015-4514) Tim Brown discovered that Firefox discloses the hostname during NTLM authentication in some circumstances. If a user were tricked in to opening a specially crafted website with NTLM v1 enabled, an attacker could exploit this to obtain sensitive information. (CVE-2015-4515) Mario Heiderich and Frederik Braun discovered that CSP could be bypassed in reader mode in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2015-4518) Tyson Smith and David Keeler discovered a use-after-poison and buffer overflow in NSS. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-7181, CVE-2015-7182) Ryan Sleevi discovered an integer overflow in NSPR. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-7183) Jason Hamilton, Peter Arremann and Sylvain Giroux discovered that panels created via the Addon SDK with { script: false } could still execute inline script. If a user installed an addon that relied on this as a security mechanism, an attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks, depending on the source of the panel content. (CVE-2015-7187) Michal Bentkowski discovered that adding white-space to hostnames that are IP address can bypass same-origin protections. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2015-7188) Looben Yang discovered a buffer overflow during script interactions with the canvas element in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-7189) Shinto K Anto discovered that CORS preflight is bypassed when receiving non-standard Content-Type headers in some circumstances. If a ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'firefox' package(s) on Ubuntu 12.04, Ubuntu 14.04, Ubuntu 15.04, Ubuntu 15.10. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-4513 BugTraq ID: 77411 http://www.securityfocus.com/bid/77411 Debian Security Information: DSA-3393 (Google Search) http://www.debian.org/security/2015/dsa-3393 Debian Security Information: DSA-3410 (Google Search) http://www.debian.org/security/2015/dsa-3410 https://security.gentoo.org/glsa/201512-10 RedHat Security Advisories: RHSA-2015:1982 http://rhn.redhat.com/errata/RHSA-2015-1982.html RedHat Security Advisories: RHSA-2015:2519 http://rhn.redhat.com/errata/RHSA-2015-2519.html http://www.securitytracker.com/id/1034069 SuSE Security Announcement: SUSE-SU-2015:1926 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html SuSE Security Announcement: SUSE-SU-2015:1978 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html SuSE Security Announcement: SUSE-SU-2015:1981 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html SuSE Security Announcement: SUSE-SU-2015:2081 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html SuSE Security Announcement: openSUSE-SU-2015:1942 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html SuSE Security Announcement: openSUSE-SU-2015:2229 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html SuSE Security Announcement: openSUSE-SU-2015:2245 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html http://www.ubuntu.com/usn/USN-2785-1 http://www.ubuntu.com/usn/USN-2819-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-4514 Common Vulnerability Exposure (CVE) ID: CVE-2015-4515 Common Vulnerability Exposure (CVE) ID: CVE-2015-4518 Common Vulnerability Exposure (CVE) ID: CVE-2015-7181 BugTraq ID: 77416 http://www.securityfocus.com/bid/77416 BugTraq ID: 91787 http://www.securityfocus.com/bid/91787 Debian Security Information: DSA-3688 (Google Search) http://www.debian.org/security/2016/dsa-3688 https://security.gentoo.org/glsa/201605-06 http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html RedHat Security Advisories: RHSA-2015:1980 http://rhn.redhat.com/errata/RHSA-2015-1980.html RedHat Security Advisories: RHSA-2015:1981 http://rhn.redhat.com/errata/RHSA-2015-1981.html http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753 http://www.ubuntu.com/usn/USN-2791-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-7182 Common Vulnerability Exposure (CVE) ID: CVE-2015-7183 BugTraq ID: 77415 http://www.securityfocus.com/bid/77415 Debian Security Information: DSA-3406 (Google Search) http://www.debian.org/security/2015/dsa-3406 http://www.ubuntu.com/usn/USN-2790-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-7187 Common Vulnerability Exposure (CVE) ID: CVE-2015-7188 Common Vulnerability Exposure (CVE) ID: CVE-2015-7189 Common Vulnerability Exposure (CVE) ID: CVE-2015-7193 Common Vulnerability Exposure (CVE) ID: CVE-2015-7194 Common Vulnerability Exposure (CVE) ID: CVE-2015-7195 Common Vulnerability Exposure (CVE) ID: CVE-2015-7196 Common Vulnerability Exposure (CVE) ID: CVE-2015-7197 Common Vulnerability Exposure (CVE) ID: CVE-2015-7198 Common Vulnerability Exposure (CVE) ID: CVE-2015-7199 Common Vulnerability Exposure (CVE) ID: CVE-2015-7200 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |