|Category:||Ubuntu Local Security Checks|
|Title:||Ubuntu Update for firefox USN-3761-3|
|Summary:||The remote host is missing an update for the 'firefox'; package(s) announced via the USN-3761-3 advisory.|
The remote host is missing an update for the 'firefox'
package(s) announced via the USN-3761-3 advisory.
USN-3761-1 fixed vulnerabilities in Firefox. The update caused several
regressions affecting spellchecker dictionaries and search engines, which
were partially fixed by USN-3761-2. This update contains the remaining fix.
We apologize for the inconvenience.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, or execute
arbitrary code. (CVE-2018-12375, CVE-2018-12376, CVE-2018-12377,
It was discovered that if a user saved passwords before Firefox 58 and
then later set a master password, an unencrypted copy of these passwords
would still be accessible. A local user could exploit this to obtain
sensitive information. (CVE-2018-12383)
firefox on Ubuntu 18.04 LTS,
Ubuntu 16.04 LTS,
Ubuntu 14.04 LTS.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2018-12375|
Common Vulnerability Exposure (CVE) ID: CVE-2018-12376
Common Vulnerability Exposure (CVE) ID: CVE-2018-12377
Common Vulnerability Exposure (CVE) ID: CVE-2018-12378
Common Vulnerability Exposure (CVE) ID: CVE-2018-12383
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.